running acs-image-check Step: acs-image-check Results: /workspace/source/source/results/acs-image-check Custom root CA variable is not set. Make sure CA trust is established Using rox central endpoint central-rhacs-operator.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com:443 Download roxctl cli roxctl image check ERROR: checking image failed: failed policies found: 1 policies violated that are failing the check Note: Violations are reported for informational purposes only and do not cause the task to fail. Running acs-image-check:report ACS_IMAGE_CHECK_EYECATCHER_BEGIN { "results": [ { "metadata": { "id": "quay.io/rhtap_qe/e2e-tests-java-springboot-eczqxhoj:on-pr-e9c1f6acd82d24f0461fcafcb28559375a53afc0@sha256:f478527910d2f07a0107829fa3a824b50102e4461f00e8b400afebe0a907f580", "additionalInfo": { "name": "quay.io/rhtap_qe/e2e-tests-java-springboot-eczqxhoj:on-pr-e9c1f6acd82d24f0461fcafcb28559375a53afc0@sha256:f478527910d2f07a0107829fa3a824b50102e4461f00e8b400afebe0a907f580", "type": "image" } }, "summary": { "CRITICAL": 0, "HIGH": 1, "LOW": 1, "MEDIUM": 0, "TOTAL": 2 }, "violatedPolicies": [ { "name": "Fixable Severity at least Important", "severity": "HIGH", "description": "Alert on deployments with fixable vulnerabilities with a Severity Rating at least Important", "violation": [ "Fixable CVE-2025-52999 (CVSS 0) (severity Important) found in component 'tools.jackson.core:jackson-core' (version 3.0.2), resolved by version 3.1.0", "Fixable CVE-2026-22016 (CVSS 7.5) (severity Important) found in component 'java-21-openjdk-headless' (version 1:21.0.10.0.7-1.el9), resolved by version 1:21.0.11.0.10-2.el9", "Fixable CVE-2026-34282 (CVSS 7.5) (severity Important) found in component 'java-21-openjdk-headless' (version 1:21.0.10.0.7-1.el9), resolved by version 1:21.0.11.0.10-2.el9", "Fixable GHSA-2m67-wjpj-xhg9 (CVSS 7.5) (severity Important) found in component 'tools.jackson.core:jackson-core' (version 3.0.2), resolved by version 3.1.1" ], "remediation": "Use your package manager to update to a fixed version in future builds or speak with your security team to mitigate the vulnerabilities.", "failingCheck": true }, { "name": "Red Hat Package Manager in Image", "severity": "LOW", "description": "Alert on deployments with components of the Red Hat/Fedora/CentOS package management system.", "violation": [ "Image includes component 'microdnf' (version 3.9.1-3.el9)", "Image includes component 'rpm' (version 4.16.1.3-39.el9)" ], "remediation": "Run `rpm -e --nodeps $(rpm -qa '*rpm*' '*dnf*' '*libsolv*' '*hawkey*' 'yum*')` in the image build for production containers.", "failingCheck": false } ] } ], "summary": { "CRITICAL": 0, "HIGH": 1, "LOW": 1, "MEDIUM": 0, "TOTAL": 2 } } ACS_IMAGE_CHECK_EYECATCHER_END running acs-image-scan Step: acs-image-scan Results: /workspace/source/source/results/acs-image-scan Custom root CA variable is not set. Make sure CA trust is established Running acs-image-scan:rox-image-scan Using rox central endpoint central-rhacs-operator.apps.rosa.rhtap-services.xmdt.p3.openshiftapps.com:443 Download roxctl cli roxctl image scan {"vulnerabilities":{"critical":0,"high":12,"medium":80,"low":58}} {"result":"SUCCESS","timestamp":"1777308021","note":"Task completed: Refer to Tekton task result SCAN_OUTPUT for found vulnerabilities.","namespace":"default","successes":"0","failures":"0","warnings":"0"} Running acs-image-scan:report ACS_IMAGE_SCAN_EYECATCHER_BEGIN { "result": { "summary": { "CRITICAL": 0, "IMPORTANT": 12, "LOW": 58, "MODERATE": 80, "TOTAL-COMPONENTS": 48, "TOTAL-VULNERABILITIES": 150 }, "vulnerabilities": [ { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5450", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5450", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5928", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5928", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5450", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5450", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5928", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5928", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-common", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4046", "cveSeverity": "IMPORTANT", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4046", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4437", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4437", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5450", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5450", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5928", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5928", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4438", "cveSeverity": "LOW", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4438", "advisoryId": "", "advisoryInfo": "", "componentName": "glibc-minimal-langpack", "componentVersion": "2.34-231.el9_7.10", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22016", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22016", "advisoryId": "RHSA-2026:9689", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:9689", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "1:21.0.11.0.10-2.el9" }, { "cveId": "CVE-2026-34282", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34282", "advisoryId": "RHSA-2026:9689", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:9689", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "1:21.0.11.0.10-2.el9" }, { "cveId": "CVE-2026-26740", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-26740", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66293", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66293", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22020", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22020", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-25646", "cveSeverity": "IMPORTANT", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-25646", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33636", "cveSeverity": "MODERATE", "cveCVSS": 7.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33636", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33416", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33416", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22801", "cveSeverity": "MODERATE", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22801", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-41254", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-41254", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22695", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22695", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64506", "cveSeverity": "MODERATE", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64506", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22021", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22021", "advisoryId": "RHSA-2026:9689", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:9689", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "1:21.0.11.0.10-2.el9" }, { "cveId": "CVE-2026-22013", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22013", "advisoryId": "RHSA-2026:9689", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:9689", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "1:21.0.11.0.10-2.el9" }, { "cveId": "CVE-2026-23865", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-23865", "advisoryId": "RHSA-2026:9689", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:9689", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "1:21.0.11.0.10-2.el9" }, { "cveId": "CVE-2026-22693", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22693", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-28164", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-28164", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34757", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34757", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64505", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64505", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22018", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22018", "advisoryId": "RHSA-2026:9689", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:9689", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "1:21.0.11.0.10-2.el9" }, { "cveId": "CVE-2026-27171", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27171", "advisoryId": "", "advisoryInfo": "", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22007", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22007", "advisoryId": "RHSA-2026:9689", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:9689", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "1:21.0.11.0.10-2.el9" }, { "cveId": "CVE-2026-34268", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34268", "advisoryId": "RHSA-2026:9689", "advisoryInfo": "https://access.redhat.com/errata/RHSA-2026:9689", "componentName": "java-21-openjdk-headless", "componentVersion": "1:21.0.10.0.7-1.el9", "componentFixedVersion": "1:21.0.11.0.10-2.el9" }, { "cveId": "CVE-2026-4878", "cveSeverity": "IMPORTANT", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4878", "advisoryId": "", "advisoryInfo": "", "componentName": "libcap", "componentVersion": "2.48-10.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6100", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6100", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13837", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13837", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4224", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4224", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3644", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3644", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-12781", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-12781", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4516", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4516", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15282", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15282", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0672", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0672", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1502", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1502", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11468", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11468", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3479", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3479", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2297", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2297", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1795", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1795", "advisoryId": "", "advisoryInfo": "", "componentName": "python3", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6100", "cveSeverity": "IMPORTANT", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6100", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4786", "cveSeverity": "IMPORTANT", "cveCVSS": 7.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4786", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5713", "cveSeverity": "MODERATE", "cveCVSS": 6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5713", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4224", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4224", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13837", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13837", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3644", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3644", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-12781", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-12781", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-4516", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-4516", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15282", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15282", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0672", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0672", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1502", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1502", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-11468", "cveSeverity": "MODERATE", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-11468", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3479", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3479", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2297", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2297", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1795", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1795", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-libs", "componentVersion": "3.9.25-3.el9_7.2", "componentFixedVersion": "" }, { "cveId": "GHSA-2m67-wjpj-xhg9", "cveSeverity": "IMPORTANT", "cveCVSS": 7.5, "cveInfo": "https://osv.dev/vulnerability/GHSA-2m67-wjpj-xhg9", "advisoryId": "", "advisoryInfo": "", "componentName": "tools.jackson.core:jackson-core", "componentVersion": "3.0.2", "componentFixedVersion": "3.1.1" }, { "cveId": "CVE-2025-52999", "cveSeverity": "IMPORTANT", "cveCVSS": 0, "cveInfo": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-6v53-7c9g-w56r", "advisoryId": "", "advisoryInfo": "", "componentName": "tools.jackson.core:jackson-core", "componentVersion": "3.0.2", "componentFixedVersion": "3.1.0" }, { "cveId": "GHSA-72hv-8253-57qq", "cveSeverity": "MODERATE", "cveCVSS": 0, "cveInfo": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-72hv-8253-57qq", "advisoryId": "", "advisoryInfo": "", "componentName": "tools.jackson.core:jackson-core", "componentVersion": "3.0.2", "componentFixedVersion": "3.1.0" }, { "cveId": "CVE-2026-25068", "cveSeverity": "MODERATE", "cveCVSS": 4.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-25068", "advisoryId": "", "advisoryInfo": "", "componentName": "alsa-lib", "componentVersion": "1.2.14-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-24401", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-24401", "advisoryId": "", "advisoryInfo": "", "componentName": "avahi-libs", "componentVersion": "0.8-23.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-68468", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-68468", "advisoryId": "", "advisoryInfo": "", "componentName": "avahi-libs", "componentVersion": "0.8-23.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-68471", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-68471", "advisoryId": "", "advisoryInfo": "", "componentName": "avahi-libs", "componentVersion": "0.8-23.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34933", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34933", "advisoryId": "", "advisoryInfo": "", "componentName": "avahi-libs", "componentVersion": "0.8-23.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-59529", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-59529", "advisoryId": "", "advisoryInfo": "", "componentName": "avahi-libs", "componentVersion": "0.8-23.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-68276", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-68276", "advisoryId": "", "advisoryInfo": "", "componentName": "avahi-libs", "componentVersion": "0.8-23.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2017-6519", "cveSeverity": "LOW", "cveCVSS": 5.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2017-6519", "advisoryId": "", "advisoryInfo": "", "componentName": "avahi-libs", "componentVersion": "0.8-23.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5278", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5278", "advisoryId": "", "advisoryInfo": "", "componentName": "coreutils-single", "componentVersion": "8.32-39.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-4504", "cveSeverity": "MODERATE", "cveCVSS": 7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4504", "advisoryId": "", "advisoryInfo": "", "componentName": "cups-libs", "componentVersion": "1:2.3.3op2-34.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34978", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34978", "advisoryId": "", "advisoryInfo": "", "componentName": "cups-libs", "componentVersion": "1:2.3.3op2-34.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34980", "cveSeverity": "MODERATE", "cveCVSS": 6.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34980", "advisoryId": "", "advisoryInfo": "", "componentName": "cups-libs", "componentVersion": "1:2.3.3op2-34.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27447", "cveSeverity": "MODERATE", "cveCVSS": 6.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27447", "advisoryId": "", "advisoryInfo": "", "componentName": "cups-libs", "componentVersion": "1:2.3.3op2-34.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34979", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34979", "advisoryId": "", "advisoryInfo": "", "componentName": "cups-libs", "componentVersion": "1:2.3.3op2-34.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34990", "cveSeverity": "MODERATE", "cveCVSS": 5.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34990", "advisoryId": "", "advisoryInfo": "", "componentName": "cups-libs", "componentVersion": "1:2.3.3op2-34.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-39314", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-39314", "advisoryId": "", "advisoryInfo": "", "componentName": "cups-libs", "componentVersion": "1:2.3.3op2-34.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-39316", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-39316", "advisoryId": "", "advisoryInfo": "", "componentName": "cups-libs", "componentVersion": "1:2.3.3op2-34.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2021-25317", "cveSeverity": "LOW", "cveCVSS": 2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-25317", "advisoryId": "", "advisoryInfo": "", "componentName": "cups-libs", "componentVersion": "1:2.3.3op2-34.el9_7.2", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1965", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1965", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13034", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13034", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3784", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3784", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3805", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3805", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3783", "cveSeverity": "MODERATE", "cveCVSS": 5.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3783", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14017", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14017", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15079", "cveSeverity": "LOW", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15079", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14819", "cveSeverity": "LOW", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14819", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14524", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14524", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11053", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11053", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7264", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7264", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15224", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15224", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-9681", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-9681", "advisoryId": "", "advisoryInfo": "", "componentName": "curl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32776", "cveSeverity": "MODERATE", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32776", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32778", "cveSeverity": "MODERATE", "cveCVSS": 5.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32778", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32777", "cveSeverity": "MODERATE", "cveCVSS": 4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32777", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-41080", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-41080", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-24515", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-24515", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-66382", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-66382", "advisoryId": "", "advisoryInfo": "", "componentName": "expat", "componentVersion": "2.5.0-5.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14512", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14512", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14087", "cveSeverity": "MODERATE", "cveCVSS": 5.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14087", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1489", "cveSeverity": "MODERATE", "cveCVSS": 5.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1489", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1484", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1484", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2023-32636", "cveSeverity": "LOW", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-32636", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0988", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0988", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-7039", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-7039", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-3360", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-3360", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1485", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1485", "advisoryId": "", "advisoryInfo": "", "componentName": "glib2", "componentVersion": "2.68.4-18.el9_7.1", "componentFixedVersion": "" }, { "cveId": "CVE-2025-68972", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-68972", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2022-3219", "cveSeverity": "LOW", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-3219", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-24883", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-24883", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-30258", "cveSeverity": "LOW", "cveCVSS": 2.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-30258", "advisoryId": "", "advisoryInfo": "", "componentName": "gnupg2", "componentVersion": "2.3.3-5.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4426", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4426", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-60753", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-60753", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5745", "cveSeverity": "MODERATE", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5745", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-30571", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-30571", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5915", "cveSeverity": "LOW", "cveCVSS": 6.6, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5915", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5918", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5918", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5916", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5916", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-1632", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-1632", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-5917", "cveSeverity": "LOW", "cveCVSS": 2.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-5917", "advisoryId": "", "advisoryInfo": "", "componentName": "libarchive", "componentVersion": "3.5.3-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libblkid", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13034", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13034", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1965", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1965", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3784", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3784", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3805", "cveSeverity": "MODERATE", "cveCVSS": 6.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3805", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-3783", "cveSeverity": "MODERATE", "cveCVSS": 5.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-3783", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14017", "cveSeverity": "MODERATE", "cveCVSS": 4.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14017", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15079", "cveSeverity": "LOW", "cveCVSS": 8.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15079", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14819", "cveSeverity": "LOW", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14819", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-14524", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-14524", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-11053", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-11053", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7264", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7264", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2025-15224", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-15224", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2024-9681", "cveSeverity": "LOW", "cveCVSS": 3.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-9681", "advisoryId": "", "advisoryInfo": "", "componentName": "libcurl-minimal", "componentVersion": "7.76.1-35.el9_7.3", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libmount", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libsmartcols", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27456", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27456", "advisoryId": "", "advisoryInfo": "", "componentName": "libuuid", "componentVersion": "2.37.4-21.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-6732", "cveSeverity": "MODERATE", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-6732", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1757", "cveSeverity": "MODERATE", "cveCVSS": 6.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-1757", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0990", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0990", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-45322", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-45322", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-34459", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-34459", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0989", "cveSeverity": "LOW", "cveCVSS": 3.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0989", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-27113", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-27113", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-0992", "cveSeverity": "LOW", "cveCVSS": 2.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-0992", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-6170", "cveSeverity": "LOW", "cveCVSS": 2.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-6170", "advisoryId": "", "advisoryInfo": "", "componentName": "libxml2", "componentVersion": "2.9.13-14.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-22185", "cveSeverity": "MODERATE", "cveCVSS": 6.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-22185", "advisoryId": "", "advisoryInfo": "", "componentName": "openldap", "componentVersion": "2.6.8-4.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28390", "cveSeverity": "MODERATE", "cveCVSS": 7.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28390", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28386", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28386", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31790", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31790", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28388", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28388", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-41996", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-41996", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-28389", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-28389", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-31789", "cveSeverity": "LOW", "cveCVSS": 5.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-31789", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2024-13176", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-13176", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-9232", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-9232", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-libs", "componentVersion": "1:3.5.1-7.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-32284", "cveSeverity": "MODERATE", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-32284", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-50181", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-50181", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-50182", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-50182", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-25645", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-25645", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-45803", "cveSeverity": "MODERATE", "cveCVSS": 4.2, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-45803", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2021-3572", "cveSeverity": "LOW", "cveCVSS": 4.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2021-3572", "advisoryId": "", "advisoryInfo": "", "componentName": "python3-pip-wheel", "componentVersion": "21.3.1-1.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-29111", "cveSeverity": "MODERATE", "cveCVSS": 7.8, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-29111", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-libs", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-4105", "cveSeverity": "MODERATE", "cveCVSS": 6.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-4105", "advisoryId": "", "advisoryInfo": "", "componentName": "systemd-libs", "componentVersion": "252-55.el9_7.8", "componentFixedVersion": "" }, { "cveId": "CVE-2026-5704", "cveSeverity": "MODERATE", "cveCVSS": 5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-5704", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-64118", "cveSeverity": "MODERATE", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-64118", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-33056", "cveSeverity": "MODERATE", "cveCVSS": 4.4, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-33056", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2023-39804", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-39804", "advisoryId": "", "advisoryInfo": "", "componentName": "tar", "componentVersion": "2:1.34-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-34743", "cveSeverity": "MODERATE", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-34743", "advisoryId": "", "advisoryInfo": "", "componentName": "xz-libs", "componentVersion": "5.2.5-8.el9_0", "componentFixedVersion": "" }, { "cveId": "CVE-2026-1225", "cveSeverity": "LOW", "cveCVSS": 0, "cveInfo": "https://nvd.nist.gov/vuln/detail/CVE-2026-1225", "advisoryId": "", "advisoryInfo": "", "componentName": "ch.qos.logback:logback-core", "componentVersion": "1.5.21", "componentFixedVersion": "1.5.25" }, { "cveId": "CVE-2023-4156", "cveSeverity": "LOW", "cveCVSS": 6.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-4156", "advisoryId": "", "advisoryInfo": "", "componentName": "gawk", "componentVersion": "5.1.0-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libgcc", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-27943", "cveSeverity": "LOW", "cveCVSS": 5.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-27943", "advisoryId": "", "advisoryInfo": "", "componentName": "libstdc++", "componentVersion": "11.5.0-11.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2025-13151", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-13151", "advisoryId": "", "advisoryInfo": "", "componentName": "libtasn1", "componentVersion": "4.16.0-9.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-50495", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-50495", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-base", "componentVersion": "6.2-12.20210508.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2023-50495", "cveSeverity": "LOW", "cveCVSS": 6.5, "cveInfo": "https://access.redhat.com/security/cve/CVE-2023-50495", "advisoryId": "", "advisoryInfo": "", "componentName": "ncurses-libs", "componentVersion": "6.2-12.20210508.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2020-12413", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-12413", "advisoryId": "", "advisoryInfo": "", "componentName": "nspr", "componentVersion": "4.36.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7531", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7531", "advisoryId": "", "advisoryInfo": "", "componentName": "nspr", "componentVersion": "4.36.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2020-12413", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-12413", "advisoryId": "", "advisoryInfo": "", "componentName": "nss", "componentVersion": "3.112.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7531", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7531", "advisoryId": "", "advisoryInfo": "", "componentName": "nss", "componentVersion": "3.112.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2020-12413", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-12413", "advisoryId": "", "advisoryInfo": "", "componentName": "nss-softokn", "componentVersion": "3.112.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7531", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7531", "advisoryId": "", "advisoryInfo": "", "componentName": "nss-softokn", "componentVersion": "3.112.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2020-12413", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-12413", "advisoryId": "", "advisoryInfo": "", "componentName": "nss-softokn-freebl", "componentVersion": "3.112.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7531", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7531", "advisoryId": "", "advisoryInfo": "", "componentName": "nss-softokn-freebl", "componentVersion": "3.112.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2020-12413", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-12413", "advisoryId": "", "advisoryInfo": "", "componentName": "nss-sysinit", "componentVersion": "3.112.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7531", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7531", "advisoryId": "", "advisoryInfo": "", "componentName": "nss-sysinit", "componentVersion": "3.112.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2020-12413", "cveSeverity": "LOW", "cveCVSS": 5.9, "cveInfo": "https://access.redhat.com/security/cve/CVE-2020-12413", "advisoryId": "", "advisoryInfo": "", "componentName": "nss-util", "componentVersion": "3.112.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2024-7531", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-7531", "advisoryId": "", "advisoryInfo": "", "componentName": "nss-util", "componentVersion": "3.112.0-8.el9_4", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-fips-provider", "componentVersion": "3.0.7-8.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2026-2673", "cveSeverity": "LOW", "cveCVSS": 3.1, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-2673", "advisoryId": "", "advisoryInfo": "", "componentName": "openssl-fips-provider-so", "componentVersion": "3.0.7-8.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-41409", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-41409", "advisoryId": "", "advisoryInfo": "", "componentName": "pcre2", "componentVersion": "10.40-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2022-41409", "cveSeverity": "LOW", "cveCVSS": 5.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2022-41409", "advisoryId": "", "advisoryInfo": "", "componentName": "pcre2-syntax", "componentVersion": "10.40-6.el9", "componentFixedVersion": "" }, { "cveId": "CVE-2024-0232", "cveSeverity": "LOW", "cveCVSS": 4.7, "cveInfo": "https://access.redhat.com/security/cve/CVE-2024-0232", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-libs", "componentVersion": "3.34.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2025-70873", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2025-70873", "advisoryId": "", "advisoryInfo": "", "componentName": "sqlite-libs", "componentVersion": "3.34.1-9.el9_7", "componentFixedVersion": "" }, { "cveId": "CVE-2026-27171", "cveSeverity": "LOW", "cveCVSS": 3.3, "cveInfo": "https://access.redhat.com/security/cve/CVE-2026-27171", "advisoryId": "", "advisoryInfo": "", "componentName": "zlib", "componentVersion": "1.2.11-40.el9", "componentFixedVersion": "" } ] } } ACS_IMAGE_SCAN_EYECATCHER_END