[ { "filename": "/tekton/home/tpa-report-amd64.json", "namespace": "required_checks", "successes": 4, "warnings": [ { "msg": "Found 6 critical vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-3596)", "name": "rhtpa_critical_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 6 } }, { "msg": "Found 156 high vulnerabilities.", "metadata": { "details": { "description": "Source: osv-github. Affected dependencies: pkg:pypi/setuptools@39.2.0 [direct] (CVE-2024-6345, CVE-2022-40897), pkg:pypi/urllib3@1.24.2 [direct] (CVE-2026-21441); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm [direct] (CVE-2023-3899), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [direct] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm [direct] (CVE-2023-3899), pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm [direct] (CVE-2022-0554, CVE-2022-0943, CVE-2022-1154, CVE-2022-1629, CVE-2022-1897, CVE-2022-1927, CVE-2022-47024, CVE-2022-0413, CVE-2022-1621, CVE-2022-1785, CVE-2026-25749, CVE-2026-33412, CVE-2023-4752), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-3515, CVE-2022-47629), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2021-33928, CVE-2021-33929, CVE-2021-33930, CVE-2021-33938, CVE-2021-46877), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-chardet@3.0.4-7.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-chardet-3.0.4-7.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-3258, CVE-2020-10968, CVE-2020-14334, CVE-2020-10969, CVE-2020-11619, CVE-2020-14061, CVE-2020-14062, CVE-2020-14195, CVE-2020-8840, CVE-2020-9546, CVE-2020-9547, CVE-2020-9548, CVE-2019-12086, CVE-2020-14380, CVE-2020-7238, CVE-2020-7943, CVE-2020-8184, CVE-2019-10086, CVE-2020-8185), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/python3-urllib3@1.24.2-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-urllib3-1.24.2-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-33503, CVE-2025-66418, CVE-2025-66471, CVE-2020-8185), pkg:rpm/redhat/python3-idna@2.5-7.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-idna-2.5-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-8185), pkg:rpm/redhat/python3-requests@2.20.0-6.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-requests-2.20.0-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-8185), pkg:rpm/redhat/python3-six@1.11.0-8.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-six-1.11.0-8.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-8185), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-3515, CVE-2022-47629), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-3515, CVE-2022-47629), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2021-33928, CVE-2021-33929, CVE-2021-33930, CVE-2021-33938, CVE-2021-46877), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/gzip@1.9-13.el8_5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gzip-1.9-13.el8_5.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2022-1271), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/pam@1.3.1-39.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pam-1.3.1-39.el8_10.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-dateutil@2.6.1-6.el8?arch=noarch\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=python-dateutil-2.6.1-6.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-3258, CVE-2020-10968, CVE-2020-14334, CVE-2020-10969, CVE-2020-11619, CVE-2020-14061, CVE-2020-14062, CVE-2020-14195, CVE-2020-8840, CVE-2020-9546, CVE-2020-9547, CVE-2020-9548, CVE-2019-12086, CVE-2020-14380, CVE-2020-7238, CVE-2020-7943, CVE-2020-8184, CVE-2019-10086, CVE-2020-8185), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-3515, CVE-2022-47629), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-33928, CVE-2021-33929, CVE-2021-33930, CVE-2021-33938, CVE-2021-46877), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/python3-six@1.11.0-8.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-six-1.11.0-8.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-8185), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/python3-chardet@3.0.4-7.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-chardet-3.0.4-7.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-3258, CVE-2020-10968, CVE-2020-14334, CVE-2020-10969, CVE-2020-11619, CVE-2020-14061, CVE-2020-14062, CVE-2020-14195, CVE-2020-8840, CVE-2020-9546, CVE-2020-9547, CVE-2020-9548, CVE-2019-12086, CVE-2020-14380, CVE-2020-7238, CVE-2020-7943, CVE-2020-8184, CVE-2019-10086, CVE-2020-8185), pkg:rpm/redhat/gzip@1.9-13.el8_5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gzip-1.9-13.el8_5.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1271), pkg:rpm/redhat/python3-dateutil@2.6.1-6.el8?arch=noarch\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=python-dateutil-2.6.1-6.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-3258, CVE-2020-10968, CVE-2020-14334, CVE-2020-10969, CVE-2020-11619, CVE-2020-14061, CVE-2020-14062, CVE-2020-14195, CVE-2020-8840, CVE-2020-9546, CVE-2020-9547, CVE-2020-9548, CVE-2019-12086, CVE-2020-14380, CVE-2020-7238, CVE-2020-7943, CVE-2020-8184, CVE-2019-10086, CVE-2020-8185), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-40217, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519), pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-3515, CVE-2022-47629), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2026-1312, CVE-2026-0980, CVE-2026-1207, CVE-2026-1287, CVE-2026-1530, CVE-2026-1531, CVE-2026-1961, CVE-2021-46877, CVE-2025-14550, CVE-2025-6176, CVE-2026-1285, CVE-2025-68121), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-5318, CVE-2025-5987), pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-3899), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/python3-subscription-manager-rhsm@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-3899), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/pam@1.3.1-39.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pam-1.3.1-39.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-6020, CVE-2025-8941, CVE-2024-10963), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-33928, CVE-2021-33929, CVE-2021-33930, CVE-2021-33938, CVE-2021-46877), pkg:rpm/redhat/brotli@1.0.6-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=brotli-1.0.6-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2023-0361), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/libtirpc@1.1.4-12.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtirpc-1.1.4-12.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/python3-urllib3@1.24.2-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-urllib3-1.24.2-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-33503, CVE-2025-66418, CVE-2025-66471, CVE-2020-8185), pkg:rpm/redhat/python3-decorator@4.2.1-2.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-decorator-4.2.1-2.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-2996), pkg:rpm/redhat/openldap@2.4.46-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=openldap-2.4.46-21.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/python3-iniparse@0.4-31.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-iniparse-0.4-31.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-8185), pkg:rpm/redhat/python3-idna@2.5-7.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-idna-2.5-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-8185), pkg:rpm/redhat/python3-requests@2.20.0-6.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-requests-2.20.0-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-8185), pkg:rpm/redhat/python3-six@1.11.0-8.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-six-1.11.0-8.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-8185), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/gzip@1.9-13.el8_5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gzip-1.9-13.el8_5.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2022-1271), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-25.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=zlib-1.2.11-25.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587)", "name": "rhtpa_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 156 } }, { "msg": "Found 184 medium vulnerabilities.", "metadata": { "details": { "description": "Source: osv-github. Affected dependencies: pkg:pypi/urllib3@1.24.2 [direct] (CVE-2020-26137, CVE-2019-11236, CVE-2023-43804, CVE-2025-50181, CVE-2024-37891, CVE-2023-45803), pkg:pypi/idna@2.5 [direct] (CVE-2024-3651), pkg:pypi/requests@2.20.0 [direct] (CVE-2023-32681, CVE-2024-35195, CVE-2024-47081, CVE-2026-25645); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [direct] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [direct] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [direct] (CVE-2025-14104), pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [direct] (CVE-2025-14104), pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm [direct] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm [direct] (CVE-2025-45582, CVE-2022-48303), pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm [direct] (CVE-2022-1420, CVE-2021-3903, CVE-2026-28421, CVE-2026-28417, CVE-2025-53905, CVE-2025-53906), pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm [direct] (CVE-2021-3826), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-34903), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2023-29499, CVE-2025-4373), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-28863, CVE-2021-44568), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519, CVE-2021-44964), pkg:rpm/redhat/python3-rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@2.3.2-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=tpm2-tss-2.3.2-6.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=file-5.33-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/tpm2-tss@2.3.2-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=tpm2-tss-2.3.2-6.el8.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519, CVE-2021-44964), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-chardet@3.0.4-7.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-chardet-3.0.4-7.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2019-0231, CVE-2019-10219, CVE-2020-7942, CVE-2019-16782, CVE-2020-8161, CVE-2020-5216, CVE-2020-5217, CVE-2020-10693, CVE-2017-17718, CVE-2019-12781, CVE-2020-10716), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/python3-urllib3@1.24.2-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-urllib3-1.24.2-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-7143, CVE-2019-16782, CVE-2023-43804, CVE-2026-21441, CVE-2024-37891, CVE-2023-45803), pkg:rpm/redhat/python3-idna@2.5-7.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-idna-2.5-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-3651, CVE-2019-16782), pkg:rpm/redhat/python3-requests@2.20.0-6.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-requests-2.20.0-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-32681, CVE-2019-16782, CVE-2024-35195, CVE-2024-47081), pkg:rpm/redhat/python3-six@1.11.0-8.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-six-1.11.0-8.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1705, CVE-2019-16782), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-34903), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2023-29499, CVE-2025-4373), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519, CVE-2021-44964), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=file-5.33-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-34903), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2023-29499, CVE-2025-4373), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-28863, CVE-2021-44568), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519, CVE-2021-44964), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=file-5.33-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/pam@1.3.1-39.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pam-1.3.1-39.el8_10.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-dateutil@2.6.1-6.el8?arch=noarch\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=python-dateutil-2.6.1-6.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2019-0231, CVE-2019-10219, CVE-2020-7942, CVE-2019-16782, CVE-2020-8161, CVE-2020-5216, CVE-2020-5217, CVE-2020-10693, CVE-2017-17718, CVE-2019-12781, CVE-2020-10716), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-34903), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2023-29499, CVE-2025-4373), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-28863, CVE-2021-44568), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/python3-six@1.11.0-8.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-six-1.11.0-8.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1705, CVE-2019-16782), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519, CVE-2021-44964), pkg:rpm/redhat/python3-rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/tpm2-tss@2.3.2-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=tpm2-tss-2.3.2-6.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=file-5.33-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.3?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libxml2-2.9.7-21.el8_10.3.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-39615, CVE-2025-9714, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2025-32414), pkg:rpm/redhat/krb5-libs@1.18.2-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=krb5-1.18.2-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-setuptools-39.2.0-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-chardet@3.0.4-7.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-chardet-3.0.4-7.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2019-0231, CVE-2019-10219, CVE-2020-7942, CVE-2019-16782, CVE-2020-8161, CVE-2020-5216, CVE-2020-5217, CVE-2020-10693, CVE-2017-17718, CVE-2019-12781, CVE-2020-10716), pkg:rpm/redhat/python3-dateutil@2.6.1-6.el8?arch=noarch\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=python-dateutil-2.6.1-6.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2019-0231, CVE-2019-10219, CVE-2020-7942, CVE-2019-16782, CVE-2020-8161, CVE-2020-5216, CVE-2020-5217, CVE-2020-10693, CVE-2017-17718, CVE-2019-12781, CVE-2020-10716), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-28863, CVE-2026-4324), pkg:rpm/redhat/gnupg2@2.2.20-4.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnupg2-2.2.20-4.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-34903), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-48795, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libarchive@3.3.3-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libarchive-3.3.3-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-26280, CVE-2022-36227, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/pam@1.3.1-39.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=pam-1.3.1-39.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-22365, CVE-2024-10041), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2023-29499, CVE-2025-4373), pkg:rpm/redhat/sqlite-libs@3.26.0-20.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=sqlite-3.26.0-20.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-35737), pkg:rpm/redhat/expat@2.5.0-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=expat-2.5.0-1.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-28863, CVE-2021-44568), pkg:rpm/redhat/gnutls@3.6.16-8.el8_10.5?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gnutls-3.6.16-8.el8_10.5.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libnghttp2@1.33.0-6.el8_10.2?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nghttp2-1.33.0-6.el8_10.2.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/python3-urllib3@1.24.2-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-urllib3-1.24.2-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-7143, CVE-2019-16782, CVE-2023-43804, CVE-2026-21441, CVE-2024-37891, CVE-2023-45803), pkg:rpm/redhat/python3-decorator@4.2.1-2.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-decorator-4.2.1-2.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1705, CVE-2023-2727, CVE-2023-2728), pkg:rpm/redhat/python3-iniparse@0.4-31.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-iniparse-0.4-31.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2019-16782), pkg:rpm/redhat/python3-idna@2.5-7.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-idna-2.5-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-3651, CVE-2019-16782), pkg:rpm/redhat/python3-requests@2.20.0-6.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-requests-2.20.0-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-32681, CVE-2019-16782, CVE-2024-35195, CVE-2024-47081), pkg:rpm/redhat/python3-six@1.11.0-8.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-six-1.11.0-8.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1705, CVE-2019-16782), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519, CVE-2021-44964), pkg:rpm/redhat/dbus-common@1.12.8-27.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/python3-rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm-build-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/dbus-daemon@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/dbus@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/tpm2-tss@2.3.2-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=tpm2-tss-2.3.2-6.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-22745), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/util-linux@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.13-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libtasn1-4.13-5.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-46848, CVE-2024-12133), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/systemd-pam@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/systemd@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libcom_err@1.45.6-7.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=e2fsprogs-1.45.6-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-24.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-pip-9.0.3-24.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/file-libs@5.33-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=file-5.33-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/lz4-libs@1.8.3-5.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=lz4-1.8.3-5.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-11.el8?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=gmp-6.1.2-11.el8.src.rpm [transitive via pkg:rpm/redhat/nettle@3.4.1-7.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=nettle-3.4.1-7.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/libsmartcols@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/findutils@4.6.0-24.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=findutils-4.6.0-24.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/dbus-libs@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/libuuid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libmount@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libblkid@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/systemd-libs@239-82.el8_10.15?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=systemd-239-82.el8_10.15.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/tar@1.30-11.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=tar-1.30-11.el8_10.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2023-4641), pkg:rpm/redhat/bzip2-libs@1.0.6-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bzip2-1.0.6-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/vim-minimal@8.0.1763-22.el8_10.1?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=vim-8.0.1763-22.el8_10.1.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc-minimal-langpack@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-251.el8_10.31?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glibc-2.28-251.el8_10.31.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-10.20180224.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-10.20180224.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ncurses-6.1-10.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-6.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=bash-4.4.20-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/libgcc@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-28.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gcc-8.5.0-28.el8_10.src.rpm [transitive via pkg:rpm/redhat/gdb-gdbserver@8.2-20.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gdb-8.2-20.el8.src.rpm] (CVE-2020-11023)", "name": "rhtpa_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 184 } }, { "msg": "Found 15 low vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [direct] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2021-3200), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [transitive via pkg:rpm/redhat/yum@4.7.0-21.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=dnf-4.7.0-21.el8_10.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [transitive via pkg:rpm/redhat/ima-evm-utils@1.3.2-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=ima-evm-utils-1.3.2-12.el8.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/rpm-libs@4.14.3-32.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=rpm-4.14.3-32.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-ethtool@0.14-5.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python-ethtool-0.14-5.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-chardet@3.0.4-7.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-chardet-3.0.4-7.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119, CVE-2018-11751), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/python3-urllib3@1.24.2-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-urllib3-1.24.2-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119), pkg:rpm/redhat/python3-idna@2.5-7.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-idna-2.5-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119), pkg:rpm/redhat/python3-requests@2.20.0-6.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-requests-2.20.0-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119), pkg:rpm/redhat/python3-six@1.11.0-8.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-six-1.11.0-8.el8.src.rpm [transitive via pkg:rpm/redhat/python3-cloud-what@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/gpgme@1.13.1-12.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=gpgme-1.13.1-12.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/libmodulemd@2.13.0-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libmodulemd-2.13.0-1.el8.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/python3-hawkey@0.63.0-21.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libdnf-0.63.0-21.el8_10.src.rpm] (CVE-2021-3200), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-libcomps@0.1.18-1.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcomps-0.1.18-1.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/python3-syspurpose@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/libpwquality@1.4.4-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libpwquality-1.4.4-6.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/python3-dateutil@2.6.1-6.el8?arch=noarch\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=python-dateutil-2.6.1-6.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119, CVE-2018-11751), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-3200), pkg:rpm/redhat/python3-six@1.11.0-8.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-six-1.11.0-8.el8.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [transitive via pkg:rpm/redhat/dnf-plugin-subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/crypto-policies-scripts@20230731-1.git3177e06.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=crypto-policies-20230731-1.git3177e06.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-15.el8_6?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=openssl-1.1.1k-15.el8_6.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-34.el8_10.11?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=curl-7.61.1-34.el8_10.11.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/python3-chardet@3.0.4-7.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-chardet-3.0.4-7.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119, CVE-2018-11751), pkg:rpm/redhat/python3-dateutil@2.6.1-6.el8?arch=noarch\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=python-dateutil-2.6.1-6.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119, CVE-2018-11751), pkg:rpm/redhat/python3-libs@3.6.8-75.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=python3-3.6.8-75.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libssh-config@0.9.6-16.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh@0.9.6-16.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libssh-0.9.6-16.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.56.4-168.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=glib2-2.56.4-168.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-34397), pkg:rpm/redhat/libsolv@0.7.20-6.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libsolv-0.7.20-6.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2021-3200), pkg:rpm/redhat/python3-urllib3@1.24.2-9.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-urllib3-1.24.2-9.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119), pkg:rpm/redhat/python3-iniparse@0.4-31.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-iniparse-0.4-31.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119), pkg:rpm/redhat/python3-idna@2.5-7.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-idna-2.5-7.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119), pkg:rpm/redhat/python3-requests@2.20.0-6.el8_10?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-requests-2.20.0-6.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119), pkg:rpm/redhat/python3-six@1.11.0-8.el8?arch=noarch\u0026distro=rhel-8.10\u0026upstream=python-six-1.11.0-8.el8.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2018-1000119), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [transitive via pkg:rpm/redhat/subscription-manager@1.28.44-1.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=subscription-manager-1.28.44-1.el8_10.src.rpm] (CVE-2024-56433), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/libfdisk@2.32.1-48.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=util-linux-2.32.1-48.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/dbus-tools@1.12.8-27.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=1\u0026upstream=dbus-1.12.8-27.el8_10.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/cracklib-dicts@2.9.6-15.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=cracklib-2.9.6-15.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libcap@2.48-6.el8_9?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libcap-2.48-6.el8_9.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/shadow-utils@4.6-23.el8_10?arch=x86_64\u0026distro=rhel-8.10\u0026epoch=2\u0026upstream=shadow-utils-4.6-23.el8_10.src.rpm [transitive via pkg:rpm/redhat/libutempter@1.1.6-14.el8?arch=x86_64\u0026distro=rhel-8.10\u0026upstream=libutempter-1.1.6-14.el8.src.rpm] (CVE-2024-56433)", "name": "rhtpa_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 15 } } ] } ] {"vulnerabilities":{"critical":6,"high":156,"medium":184,"low":15,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":0,"medium":0,"low":0,"unknown":0}} {"image": {"pullspec": "quay.io/rhtap_qe/default-tenant/tsf-demo-comp:8d944c67d63d18ee349cc25f0ff95e6ef09021c2", "digests": ["sha256:2fe12caef94727d71e0a0319646e12a218bbafdeb387f1f46c6238f171fdbae9"]}} {"result":"SUCCESS","timestamp":"2026-04-18T08:26:28+00:00","note":"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.","namespace":"default","successes":0,"failures":0,"warnings":0}