[ { "filename": "/tekton/home/tpa-report-amd64.json", "namespace": "required_checks", "successes": 4, "warnings": [ { "msg": "Found 13 critical vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/expat@2.2.5-10.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=expat-2.2.5-10.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-23852, CVE-2022-25235, CVE-2022-25315), pkg:rpm/redhat/ca-certificates@2022.2.54-80.2.el8_6?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ca-certificates-2022.2.54-80.2.el8_6.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-80.2.el8_6?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ca-certificates-2022.2.54-80.2.el8_6.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/ca-certificates@2022.2.54-80.2.el8_6?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ca-certificates-2022.2.54-80.2.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/expat@2.2.5-10.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=expat-2.2.5-10.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-22822, CVE-2022-22823, CVE-2022-22824, CVE-2022-23852, CVE-2022-25235, CVE-2022-25315), pkg:rpm/redhat/ca-certificates@2022.2.54-80.2.el8_6?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ca-certificates-2022.2.54-80.2.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/ca-certificates@2022.2.54-80.2.el8_6?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ca-certificates-2022.2.54-80.2.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/ca-certificates@2022.2.54-80.2.el8_6?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ca-certificates-2022.2.54-80.2.el8_6.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2024-3596), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-15467), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-32207), pkg:rpm/redhat/ca-certificates@2022.2.54-80.2.el8_6?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ca-certificates-2022.2.54-80.2.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-37920), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2024-40896, CVE-2025-49794, CVE-2025-49796), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2024-3596)", "name": "rhtpa_critical_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 13 } }, { "msg": "Found 163 high vulnerabilities.", "metadata": { "details": { "description": "Source: osv-github. Affected dependencies: pkg:pypi/setuptools@39.2.0 [direct] (CVE-2024-6345, CVE-2022-40897), pkg:maven/io.quarkus/quarkus-vertx-http@1.13.2.Final [direct] (CVE-2026-39852, CVE-2023-4853, CVE-2022-4147), pkg:maven/io.netty/netty-codec-http2@4.1.49.Final [direct] (CVE-2025-55163, CVE-2026-42587), pkg:maven/io.netty/netty-codec-http@4.1.49.Final [direct] (CVE-2026-33870, CVE-2026-42587, CVE-2026-42584), pkg:maven/io.quarkus/quarkus-resteasy@1.13.2.Final [direct] (CVE-2025-1634), pkg:maven/io.netty/netty-codec-dns@4.1.49.Final [direct] (CVE-2026-42579), pkg:maven/io.netty/netty-codec@4.1.49.Final [direct] (CVE-2021-37136, CVE-2021-37137, CVE-2026-42583), pkg:maven/io.quarkus/quarkus-core@1.13.2.Final [direct] (CVE-2024-2700); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [direct] (CVE-2023-0767), pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [direct] (CVE-2025-5318, CVE-2025-5987, CVE-2025-14821), pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm [direct] (CVE-2025-50059, CVE-2025-30749, CVE-2025-50106, CVE-2023-25193, CVE-2024-20932, CVE-2026-21945, CVE-2026-22016, CVE-2026-34282, CVE-2023-21930, CVE-2024-20918, CVE-2024-20952, CVE-2024-21147, CVE-2025-21587, CVE-2023-48161, CVE-2025-64720, CVE-2025-65018), pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm [direct] (CVE-2021-33928, CVE-2021-33929, CVE-2021-33930, CVE-2021-33938, CVE-2021-46877), pkg:maven/io.quarkus/quarkus-resteasy@1.13.2.Final [direct] (CVE-2023-6267), pkg:maven/io.quarkus/quarkus-vertx-http@1.13.2.Final [direct] (CVE-2023-4853), pkg:maven/io.netty/netty-codec-http2@4.1.49.Final [direct] (CVE-2023-44487, CVE-2025-55163), pkg:maven/io.quarkus/quarkus-core@1.13.2.Final [direct] (CVE-2024-2700), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/expat@2.2.5-10.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=expat-2.2.5-10.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2021-45960, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827, CVE-2022-40674, CVE-2021-46143, CVE-2018-20843, CVE-2019-15903, CVE-2022-25314, CVE-2022-43680, CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/platform-python-setuptools@39.2.0-6.el8_7.1?arch=noarch\u0026distro=rhel-8.7\u0026upstream=python-setuptools-39.2.0-6.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/nss@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/nss-softokn@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-6.el8_7.1?arch=noarch\u0026distro=rhel-8.7\u0026upstream=python-setuptools-39.2.0-6.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/nspr@4.34.0-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nspr-4.34.0-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/nss-util@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/nss-softokn-freebl@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/platform-python@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2022-48560, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2022-48560, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/zlib@1.2.11-21.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=zlib-1.2.11-21.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-17.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=sqlite-3.26.0-17.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/libtirpc@1.1.4-8.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libtirpc-1.1.4-8.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-21.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=zlib-1.2.11-21.el8_7.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987, CVE-2025-14821), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-21.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=zlib-1.2.11-21.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/expat@2.2.5-10.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=expat-2.2.5-10.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2021-45960, CVE-2022-22825, CVE-2022-22826, CVE-2022-22827, CVE-2022-40674, CVE-2021-46143, CVE-2018-20843, CVE-2019-15903, CVE-2022-25314, CVE-2022-43680, CVE-2023-52425, CVE-2024-28757, CVE-2024-45490, CVE-2024-45491, CVE-2024-8176), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/platform-python-setuptools@39.2.0-6.el8_7.1?arch=noarch\u0026distro=rhel-8.7\u0026upstream=python-setuptools-39.2.0-6.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/nss@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/nss-softokn@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-6.el8_7.1?arch=noarch\u0026distro=rhel-8.7\u0026upstream=python-setuptools-39.2.0-6.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-6345, CVE-2025-47273), pkg:rpm/redhat/nspr@4.34.0-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nspr-4.34.0-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/javapackages-filesystem@5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6?arch=noarch\u0026distro=rhel-8.7\u0026upstream=javapackages-tools-5.3.0-1.module%2Bel8%2B2447%2B6f56d9a6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2025-48734, CVE-2019-10086), pkg:rpm/redhat/nss-softokn-freebl@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/nss-util@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-0767), pkg:rpm/redhat/platform-python@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2023-6597, CVE-2024-12718, CVE-2025-4517, CVE-2022-48560, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/python3-libs@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-40217, CVE-2026-6100, CVE-2022-42919, CVE-2023-6597, CVE-2015-20107, CVE-2024-12718, CVE-2025-4517, CVE-2020-10735, CVE-2022-45061, CVE-2022-48560, CVE-2023-24329, CVE-2024-6232, CVE-2025-12084, CVE-2025-4138, CVE-2025-4435, CVE-2025-8194, CVE-2021-28861, CVE-2025-4330, CVE-2025-15366, CVE-2025-15367, CVE-2026-1299, CVE-2026-4519, CVE-2026-4786), pkg:rpm/redhat/zlib@1.2.11-21.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=zlib-1.2.11-21.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/lz4-libs@1.8.3-3.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=lz4-1.8.3-3.el8_4.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2019-17543), pkg:rpm/redhat/cups-libs@2.2.6-50.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=cups-2.2.6-50.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2025-58060, CVE-2024-47175, CVE-2023-34241), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/systemd-libs@239-68.el8_7.4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=systemd-239-68.el8_7.4.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/sqlite-libs@3.26.0-17.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=sqlite-3.26.0-17.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/libtirpc@1.1.4-8.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libtirpc-1.1.4-8.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2021-46828), pkg:rpm/redhat/gnutls@3.6.16-6.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnutls-3.6.16-6.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2026-1584, CVE-2026-33845, CVE-2026-33846, CVE-2023-0361), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2021-44964), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2025-15079, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-3515, CVE-2022-47629), pkg:rpm/redhat/gnupg2@2.2.20-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnupg2-2.2.20-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/zlib@1.2.11-21.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=zlib-1.2.11-21.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987, CVE-2025-14821), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987, CVE-2025-14821), pkg:rpm/redhat/lz4-libs@1.8.3-3.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=lz4-1.8.3-3.el8_4.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2019-17543), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libarchive@3.3.3-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libarchive-3.3.3-4.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/systemd-libs@239-68.el8_7.4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=systemd-239-68.el8_7.4.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glib2-2.56.4-159.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.26.0-17.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=sqlite-3.26.0-17.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/brotli@1.0.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=brotli-1.0.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-33928, CVE-2021-33929, CVE-2021-33930, CVE-2021-33938, CVE-2021-46877), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/gnutls@3.6.16-6.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnutls-3.6.16-6.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2026-1584, CVE-2026-33845, CVE-2026-33846, CVE-2023-0361), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_2.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nghttp2-1.33.0-3.el8_2.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openldap@2.4.46-18.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=openldap-2.4.46-18.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2025-15079, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/zlib@1.2.11-21.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=zlib-1.2.11-21.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2025-5318, CVE-2025-5987, CVE-2025-14821), pkg:rpm/redhat/lz4-libs@1.8.3-3.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=lz4-1.8.3-3.el8_4.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2019-17543), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2025-5318, CVE-2025-5987, CVE-2025-14821), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libarchive@3.3.3-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libarchive-3.3.3-4.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/sqlite-libs@3.26.0-17.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=sqlite-3.26.0-17.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/brotli@1.0.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=brotli-1.0.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_2.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nghttp2-1.33.0-3.el8_2.1.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/openldap@2.4.46-18.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=openldap-2.4.46-18.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-1473, CVE-2022-3358, CVE-2022-3602, CVE-2022-3786, CVE-2022-4450, CVE-2023-0215, CVE-2023-0216, CVE-2023-0217, CVE-2023-0401, CVE-2023-5363, CVE-2023-0286, CVE-2024-12797, CVE-2025-69419), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2025-15079, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-22576, CVE-2023-38545, CVE-2022-27775, CVE-2022-27782, CVE-2024-2398), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2024-56171, CVE-2022-40304, CVE-2025-24928, CVE-2025-7425, CVE-2022-40303, CVE-2024-25062, CVE-2025-32415, CVE-2025-49795, CVE-2025-6021, CVE-2025-7424, CVE-2022-29824), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-42898, CVE-2023-39975, CVE-2024-26462, CVE-2024-37370, CVE-2020-17049), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/libksba@1.3.5-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libksba-1.3.5-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-3515, CVE-2022-47629), pkg:rpm/redhat/gnupg2@2.2.20-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnupg2-2.2.20-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2026-24882, CVE-2025-68973), pkg:rpm/redhat/zlib@1.2.11-21.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=zlib-1.2.11-21.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987, CVE-2025-14821), pkg:rpm/redhat/lz4-libs@1.8.3-3.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=lz4-1.8.3-3.el8_4.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2019-17543), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-5318, CVE-2025-5987, CVE-2025-14821), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/libarchive@3.3.3-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libarchive-3.3.3-4.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-5914, CVE-2026-4111, CVE-2026-4424, CVE-2026-5121), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/systemd-libs@239-68.el8_7.4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=systemd-239-68.el8_7.4.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glib2-2.56.4-159.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-13601, CVE-2024-52533), pkg:rpm/redhat/sqlite-libs@3.26.0-17.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=sqlite-3.26.0-17.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-6965, CVE-2023-7104, CVE-2025-3277), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/brotli@1.0.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=brotli-1.0.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-6176), pkg:rpm/redhat/gnutls@3.6.16-6.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnutls-3.6.16-6.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-2509, CVE-2024-0553, CVE-2024-0567, CVE-2026-1584, CVE-2026-33845, CVE-2026-33846, CVE-2023-0361), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_2.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nghttp2-1.33.0-3.el8_2.1.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-44487, CVE-2026-27135), pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2021-33928, CVE-2021-33929, CVE-2021-33930, CVE-2021-33938, CVE-2021-46877), pkg:rpm/redhat/openldap@2.4.46-18.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=openldap-2.4.46-18.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-2953), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-21.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=zlib-1.2.11-21.el8_7.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-21.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=zlib-1.2.11-21.el8_7.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/xz-libs@5.2.4-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=xz-5.2.4-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2022-1271, CVE-2025-31115), pkg:rpm/redhat/zlib@1.2.11-21.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=zlib-1.2.11-21.el8_7.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/lz4-libs@1.8.3-3.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=lz4-1.8.3-3.el8_4.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2019-17543), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/systemd-libs@239-68.el8_7.4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=systemd-239-68.el8_7.4.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2026-29111), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2026-41989), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/zlib@1.2.11-21.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=zlib-1.2.11-21.el8_7.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2018-25032, CVE-2022-37434), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2023-2603), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2024-2961, CVE-2026-0861, CVE-2023-4911, CVE-2024-33599, CVE-2025-4802), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2023-29491, CVE-2025-69720), pkg:rpm/redhat/pcre2@10.32-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=pcre2-10.32-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2022-1586, CVE-2022-1587)", "name": "rhtpa_high_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 163 } }, { "msg": "Found 258 medium vulnerabilities.", "metadata": { "details": { "description": "Source: manual. Affected dependencies: pkg:maven/io.netty/netty-handler@4.1.49.Final [direct] (CVE-2023-34462); Source: osv-github. Affected dependencies: pkg:maven/io.quarkus/quarkus-vertx-http@1.13.2.Final [direct] (CVE-2023-0044), pkg:maven/io.netty/netty-codec-http2@4.1.49.Final [direct] (CVE-2021-21295, CVE-2021-21409), pkg:maven/io.netty/netty-codec-http@4.1.49.Final [direct] (CVE-2021-43797, CVE-2025-67735, CVE-2026-42580, CVE-2026-42585, CVE-2021-21290, CVE-2026-42581, CVE-2022-24823, CVE-2024-29025, CVE-2026-41417), pkg:maven/io.quarkus/quarkus-core@1.13.2.Final [direct] (CVE-2023-2974), pkg:maven/io.netty/netty-handler@4.1.49.Final [direct] (CVE-2023-34462), pkg:maven/org.jboss.resteasy/resteasy-core@4.5.9.Final [direct] (CVE-2021-20293, CVE-2023-0482, CVE-2021-20289), pkg:maven/io.netty/netty-common@4.1.49.Final [direct] (CVE-2024-47535, CVE-2025-25193), pkg:maven/io.vertx/vertx-web@3.9.6 [direct] (CVE-2025-11966), pkg:maven/com.fasterxml.jackson.core/jackson-core@2.12.1 [direct] (CVE-2025-49128); Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [direct] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [direct] (CVE-2026-0966, CVE-2023-48795, CVE-2026-3731, CVE-2025-5372, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm [direct] (CVE-2026-21933, CVE-2023-21954, CVE-2023-21967, CVE-2024-20919, CVE-2024-20921, CVE-2025-53057, CVE-2025-30698, CVE-2023-21939, CVE-2023-22081, CVE-2026-22013, CVE-2026-22021, CVE-2026-23865, CVE-2023-22041, CVE-2024-21140, CVE-2024-21145, CVE-2024-21235, CVE-2025-21502, CVE-2025-30691, CVE-2025-30754, CVE-2025-53066, CVE-2026-21925, CVE-2024-20945), pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm [direct] (CVE-2024-28863, CVE-2021-44568), pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm [direct] (CVE-2022-48554), pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm [direct] (CVE-2023-4641), pkg:maven/io.quarkus/quarkus-resteasy@1.13.2.Final [direct] (CVE-2023-5675), pkg:maven/io.quarkus/quarkus-vertx-http@1.13.2.Final [direct] (CVE-2023-2974), pkg:maven/io.vertx/vertx-core@3.9.6 [direct] (CVE-2024-1023, CVE-2024-1300), pkg:maven/io.netty/netty-handler@4.1.49.Final [direct] (CVE-2023-34462), pkg:maven/io.netty/netty-codec-http@4.1.49.Final [direct] (CVE-2024-29025), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-2408, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/expat@2.2.5-10.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=expat-2.2.5-10.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-23990, CVE-2022-25313, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/platform-python-setuptools@39.2.0-6.el8_7.1?arch=noarch\u0026distro=rhel-8.7\u0026upstream=python-setuptools-39.2.0-6.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/nss@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/nss-softokn@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-6.el8_7.1?arch=noarch\u0026distro=rhel-8.7\u0026upstream=python-setuptools-39.2.0-6.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/nspr@4.34.0-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nspr-4.34.0-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/nss-util@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/nss-softokn-freebl@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/platform-python@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2022-48564, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2026-0865), pkg:rpm/redhat/python3-libs@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2022-48564, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-17.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=sqlite-3.26.0-17.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2020-24736, CVE-2022-35737), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-10.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=gmp-6.1.2-10.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libtasn1-4.13-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2021-46848, CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=e2fsprogs-1.45.6-5.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=python-pip-9.0.3-22.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.23.22-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=p11-kit-0.23.22-1.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.6-26.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bzip2-1.0.6-26.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-2408, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2026-0966, CVE-2023-48795, CVE-2026-3731, CVE-2025-5372, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/gmp@6.1.2-10.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=gmp-6.1.2-10.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libtasn1-4.13-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2021-46848, CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=e2fsprogs-1.45.6-5.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/p11-kit@0.23.22-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=p11-kit-0.23.22-1.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-2408, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/libgcc@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libtasn1-4.13-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2021-46848, CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/p11-kit@0.23.22-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=p11-kit-0.23.22-1.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-2408, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/expat@2.2.5-10.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=expat-2.2.5-10.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-23990, CVE-2022-25313, CVE-2024-45492, CVE-2024-50602, CVE-2025-59375), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/platform-python-setuptools@39.2.0-6.el8_7.1?arch=noarch\u0026distro=rhel-8.7\u0026upstream=python-setuptools-39.2.0-6.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/nss@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/nss-softokn@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/python3-setuptools-wheel@39.2.0-6.el8_7.1?arch=noarch\u0026distro=rhel-8.7\u0026upstream=python-setuptools-39.2.0-6.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-40897), pkg:rpm/redhat/nspr@4.34.0-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nspr-4.34.0-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/nss-softokn-freebl@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/nss-util@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-5388, CVE-2024-6602, CVE-2023-6135), pkg:rpm/redhat/platform-python@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2022-48564, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2026-0865), pkg:rpm/redhat/python3-libs@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-6923, CVE-2025-0938, CVE-2025-13836, CVE-2022-48564, CVE-2024-9287, CVE-2024-0450, CVE-2007-4559, CVE-2023-27043, CVE-2024-8088, CVE-2024-0397, CVE-2024-7592, CVE-2026-0865, CVE-2025-6069, CVE-2025-8291, CVE-2025-6075), pkg:rpm/redhat/cups-libs@2.2.6-50.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=cups-2.2.6-50.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-26691, CVE-2023-32360, CVE-2025-58364, CVE-2023-32324, CVE-2025-58436, CVE-2024-35235), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/systemd-libs@239-68.el8_7.4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=systemd-239-68.el8_7.4.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-26604, CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/sqlite-libs@3.26.0-17.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=sqlite-3.26.0-17.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2020-24736, CVE-2022-35737), pkg:rpm/redhat/gnutls@3.6.16-6.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnutls-3.6.16-6.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/lua@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519, CVE-2021-44964), pkg:rpm/redhat/dbus-libs@1.12.8-23.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=dbus-1.12.8-23.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-42010, CVE-2022-42011, CVE-2022-42012, CVE-2023-34969), pkg:rpm/redhat/avahi-libs@0.7-20.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=avahi-0.7-20.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2021-3468, CVE-2023-1981, CVE-2023-38469, CVE-2023-38470, CVE-2023-38471, CVE-2023-38472, CVE-2023-38473, CVE-2021-3502, CVE-2024-52615, CVE-2024-52616), pkg:rpm/redhat/gmp@6.1.2-10.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=gmp-6.1.2-10.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libmount@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libgcc@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.13-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libtasn1-4.13-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2021-46848, CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=e2fsprogs-1.45.6-5.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/python3-pip-wheel@9.0.3-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=python-pip-9.0.3-22.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2007-4559), pkg:rpm/redhat/p11-kit@0.23.22-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=p11-kit-0.23.22-1.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.6-26.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bzip2-1.0.6-26.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/alsa-lib@1.2.7.2-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=alsa-lib-1.2.7.2-1.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2026-25068), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-2408, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-13034, CVE-2025-14819, CVE-2026-1965, CVE-2022-32206, CVE-2023-23916, CVE-2025-14524, CVE-2026-3784, CVE-2026-5545, CVE-2026-5773, CVE-2026-6429, CVE-2026-3805, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2025-10966, CVE-2026-3783, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2026-4873, CVE-2026-6253, CVE-2022-27774, CVE-2022-32221, CVE-2025-10148, CVE-2025-14017, CVE-2025-15224, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/gnupg2@2.2.20-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnupg2-2.2.20-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-34903, CVE-2025-68972), pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-0966, CVE-2023-48795, CVE-2026-3731, CVE-2025-5372, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-0966, CVE-2023-48795, CVE-2026-3731, CVE-2025-5372, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libarchive@3.3.3-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libarchive-3.3.3-4.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-26280, CVE-2026-4426, CVE-2022-36227, CVE-2025-60753, CVE-2026-5745, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/systemd-libs@239-68.el8_7.4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=systemd-239-68.el8_7.4.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-26604, CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glib2-2.56.4-159.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/sqlite-libs@3.26.0-17.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=sqlite-3.26.0-17.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2020-24736, CVE-2022-35737), pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-28863, CVE-2021-44568), pkg:rpm/redhat/gnutls@3.6.16-6.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnutls-3.6.16-6.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_2.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nghttp2-1.33.0-3.el8_2.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519, CVE-2021-44964), pkg:rpm/redhat/rpm-libs@4.14.3-24.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=rpm-4.14.3-24.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-24.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=rpm-4.14.3-24.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.1.2-10.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=gmp-6.1.2-10.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libgcc@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libmount@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libsmartcols@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.13-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libtasn1-4.13-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-46848, CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=e2fsprogs-1.45.6-5.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.23.22-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=p11-kit-0.23.22-1.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.6-26.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bzip2-1.0.6-26.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-2408, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2025-13034, CVE-2025-14819, CVE-2026-1965, CVE-2022-32206, CVE-2023-23916, CVE-2025-14524, CVE-2026-3784, CVE-2026-5545, CVE-2026-5773, CVE-2026-6429, CVE-2026-3805, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2025-10966, CVE-2026-3783, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2026-4873, CVE-2026-6253, CVE-2022-27774, CVE-2022-32221, CVE-2025-10148, CVE-2025-14017, CVE-2025-15224, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2026-0966, CVE-2023-48795, CVE-2026-3731, CVE-2025-5372, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2026-0966, CVE-2023-48795, CVE-2026-3731, CVE-2025-5372, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libarchive@3.3.3-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libarchive-3.3.3-4.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-26280, CVE-2026-4426, CVE-2022-36227, CVE-2025-60753, CVE-2026-5745, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/sqlite-libs@3.26.0-17.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=sqlite-3.26.0-17.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2020-24736, CVE-2022-35737), pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_2.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nghttp2-1.33.0-3.el8_2.1.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519, CVE-2021-44964), pkg:rpm/redhat/rpm-libs@4.14.3-24.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=rpm-4.14.3-24.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-24.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=rpm-4.14.3-24.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.1.2-10.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=gmp-6.1.2-10.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libgcc@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libtasn1@4.13-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libtasn1-4.13-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2021-46848, CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=e2fsprogs-1.45.6-5.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/p11-kit@0.23.22-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=p11-kit-0.23.22-1.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.6-26.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bzip2-1.0.6-26.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-1292, CVE-2022-2068, CVE-2023-2650, CVE-2023-6129, CVE-2025-69421, CVE-2025-11187, CVE-2020-1971, CVE-2022-4304, CVE-2023-0464, CVE-2023-6237, CVE-2024-2408, CVE-2024-5535, CVE-2024-6119, CVE-2025-15468, CVE-2025-66199, CVE-2025-69420, CVE-2026-22796, CVE-2024-4741, CVE-2025-9230, CVE-2024-0727, CVE-2025-15469, CVE-2026-22795, CVE-2022-1343, CVE-2022-2097, CVE-2023-0465, CVE-2023-0466, CVE-2023-2975, CVE-2023-3446, CVE-2023-3817, CVE-2023-5678, CVE-2024-4603, CVE-2023-1255, CVE-2022-4203, CVE-2025-68160, CVE-2025-69418), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-13034, CVE-2025-14819, CVE-2026-1965, CVE-2022-32206, CVE-2023-23916, CVE-2025-14524, CVE-2026-3784, CVE-2026-5545, CVE-2026-5773, CVE-2026-6429, CVE-2026-3805, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2025-10966, CVE-2026-3783, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2026-4873, CVE-2026-6253, CVE-2022-27774, CVE-2022-32221, CVE-2025-10148, CVE-2025-14017, CVE-2025-15224, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-32206, CVE-2023-23916, CVE-2022-43552, CVE-2023-27535, CVE-2023-27536, CVE-2023-28321, CVE-2023-27538, CVE-2022-32208, CVE-2023-46218, CVE-2025-9086, CVE-2022-27774, CVE-2022-32221, CVE-2022-27776, CVE-2023-27533), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-39615, CVE-2026-6732, CVE-2025-9714, CVE-2026-1757, CVE-2022-49043, CVE-2023-28484, CVE-2023-29469, CVE-2026-0990, CVE-2025-32414, CVE-2025-26434), pkg:rpm/redhat/krb5-libs@1.18.2-22.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=krb5-1.18.2-22.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-36054, CVE-2024-37371, CVE-2025-24528, CVE-2024-26458, CVE-2024-26461, CVE-2025-3576), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/gnupg2@2.2.20-3.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnupg2-2.2.20-3.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-34903, CVE-2025-68972), pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2026-0966, CVE-2023-48795, CVE-2026-3731, CVE-2025-5372, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2026-0966, CVE-2023-48795, CVE-2026-3731, CVE-2025-5372, CVE-2023-2283, CVE-2023-6004, CVE-2023-1667), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/libarchive@3.3.3-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libarchive-3.3.3-4.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-26280, CVE-2026-4426, CVE-2022-36227, CVE-2025-60753, CVE-2026-5745, CVE-2024-57970, CVE-2025-25724), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/systemd-libs@239-68.el8_7.4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=systemd-239-68.el8_7.4.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-26604, CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glib2-2.56.4-159.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-32611, CVE-2023-32665, CVE-2025-14512, CVE-2023-29499, CVE-2025-14087, CVE-2025-4373), pkg:rpm/redhat/sqlite-libs@3.26.0-17.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=sqlite-3.26.0-17.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2020-24736, CVE-2022-35737), pkg:rpm/redhat/gnutls@3.6.16-6.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnutls-3.6.16-6.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-32988, CVE-2025-32990, CVE-2025-6395, CVE-2026-3833, CVE-2023-5981, CVE-2024-12243, CVE-2024-28834, CVE-2025-14831, CVE-2025-32989, CVE-2024-28835, CVE-2025-9820), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/libnghttp2@1.33.0-3.el8_2.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nghttp2-1.33.0-3.el8_2.1.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2024-28182), pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2024-28863, CVE-2021-44568), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/lua-libs@5.3.4-12.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=lua-5.3.4-12.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-33099, CVE-2022-28805, CVE-2021-43519, CVE-2021-44964), pkg:rpm/redhat/rpm-libs@4.14.3-24.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=rpm-4.14.3-24.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/rpm@4.14.3-24.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=rpm-4.14.3-24.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2021-35938, CVE-2021-35939, CVE-2021-35937), pkg:rpm/redhat/gmp@6.1.2-10.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=gmp-6.1.2-10.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2021-43618), pkg:rpm/redhat/libmount@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libsmartcols@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libstdc%2B%2B@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libblkid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libgcc@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libtasn1@4.13-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libtasn1-4.13-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2021-46848, CVE-2025-13151, CVE-2024-12133), pkg:rpm/redhat/libcom_err@1.45.6-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=e2fsprogs-1.45.6-5.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-1304), pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2022-48554), pkg:rpm/redhat/p11-kit@0.23.22-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=p11-kit-0.23.22-1.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2026-2100), pkg:rpm/redhat/bzip2-libs@1.0.6-26.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bzip2-1.0.6-26.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/elfutils-libelf@0.187-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=elfutils-0.187-4.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libidn2@2.2.0-1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libidn2-2.2.0-1.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/rootfiles@8.1-22.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=rootfiles-8.1-22.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/bzip2-libs@1.0.6-26.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bzip2-1.0.6-26.el8.src.rpm [transitive via pkg:rpm/redhat/libsemanage@2.9-9.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsemanage-2.9-9.el8_6.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libyaml@0.1.7-5.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libyaml-0.1.7-5.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/systemd-libs@239-68.el8_7.4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=systemd-239-68.el8_7.4.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2023-26604, CVE-2023-7008, CVE-2022-3821, CVE-2022-4415, CVE-2022-45873, CVE-2025-4598), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2024-2236), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/libblkid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2025-14104, CVE-2026-27456), pkg:rpm/redhat/libmount@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/libgcc@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/libuuid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2025-14104), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/file-libs@5.33-21.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=file-5.33-21.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2026-4878), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2022-3715), pkg:rpm/redhat/libgcc@8.5.0-16.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gcc-8.5.0-16.el8_7.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2020-11023), pkg:rpm/redhat/bzip2-libs@1.0.6-26.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bzip2-1.0.6-26.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2019-12900), pkg:rpm/redhat/glibc@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2023-4527, CVE-2026-4437, CVE-2026-6238, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2026-3904, CVE-2026-5435, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2026-4046, CVE-2026-5450, CVE-2026-5928, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602, CVE-2026-4438), pkg:rpm/redhat/glibc-minimal-langpack@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/glibc-common@2.28-211.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glibc-2.28-211.el8.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2023-4527, CVE-2023-4806, CVE-2023-4813, CVE-2025-15281, CVE-2025-5702, CVE-2025-0395, CVE-2024-33600, CVE-2026-0915, CVE-2025-8058, CVE-2024-33601, CVE-2024-33602), pkg:rpm/redhat/ncurses-base@6.1-9.20180224.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/ncurses-libs@6.1-9.20180224.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=ncurses-6.1-9.20180224.el8.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2022-29458), pkg:rpm/redhat/bash@4.4.20-4.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=bash-4.4.20-4.el8_6.src.rpm [transitive via pkg:rpm/redhat/npth@1.5-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=npth-1.5-4.el8.src.rpm] (CVE-2022-3715)", "name": "rhtpa_medium_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 258 } }, { "msg": "Found 44 low vulnerabilities.", "metadata": { "details": { "description": "Source: redhat-csaf. Affected dependencies: pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [direct] (CVE-2023-6918), pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm [direct] (CVE-2023-21937, CVE-2023-21938, CVE-2023-21968, CVE-2023-22025, CVE-2023-22036, CVE-2023-22044, CVE-2023-22045, CVE-2023-22049, CVE-2024-21011, CVE-2024-21012, CVE-2024-21068, CVE-2024-21094, CVE-2024-21131, CVE-2024-21138, CVE-2024-21208, CVE-2024-21210, CVE-2024-21217, CVE-2026-22018, CVE-2023-22006, CVE-2026-22007, CVE-2026-34268), pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm [direct] (CVE-2021-3200), pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm [direct] (CVE-2024-56433), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/expat@2.2.5-10.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=expat-2.2.5-10.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/platform-python@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2024-11168, CVE-2024-4032), pkg:rpm/redhat/python3-libs@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/nss-sysinit@3.79.0-11.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=nss-3.79.0-11.el8_7.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libdb@5.3.28-42.el8_4?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdb-5.3.28-42.el8_4.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/expat@2.2.5-10.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=expat-2.2.5-10.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2026-41080), pkg:rpm/redhat/platform-python@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-11168, CVE-2024-4032), pkg:rpm/redhat/python3-libs@3.6.8-48.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=python3-3.6.8-48.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2024-11168, CVE-2024-4032, CVE-2024-5642), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/gnutls@3.6.16-6.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnutls-3.6.16-6.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2026-3832), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/java-17-openjdk-headless@17.0.7.0.7-1.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=java-17-openjdk-17.0.7.0.7-1.el8_7.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2026-6276, CVE-2022-35252), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glib2-2.56.4-159.el8.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2021-3200), pkg:rpm/redhat/gnutls@3.6.16-6.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnutls-3.6.16-6.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-3832), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/microdnf@3.8.0-2.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=microdnf-3.8.0-2.el8.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2026-6276, CVE-2022-35252), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/openssl-libs@1.1.1k-9.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=1\u0026upstream=openssl-1.1.1k-9.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2024-2511), pkg:rpm/redhat/curl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2026-6276, CVE-2022-35252), pkg:rpm/redhat/libcurl@7.61.1-25.el8_7.3?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=curl-7.61.1-25.el8_7.3.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-27534, CVE-2023-28322, CVE-2023-38546, CVE-2022-35252), pkg:rpm/redhat/libxml2@2.9.7-15.el8_7.1?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libxml2-2.9.7-15.el8_7.1.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2026-0989, CVE-2026-0992, CVE-2025-6170), pkg:rpm/redhat/libssh@0.9.6-3.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libssh-config@0.9.6-3.el8?arch=noarch\u0026distro=rhel-8.7\u0026upstream=libssh-0.9.6-3.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-6918), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=glib2-2.56.4-159.el8.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2024-34397, CVE-2025-7039, CVE-2026-0988), pkg:rpm/redhat/gnutls@3.6.16-6.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=gnutls-3.6.16-6.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2026-3832), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libsolv@0.7.20-4.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libsolv-0.7.20-4.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2021-3200), pkg:rpm/redhat/libblkid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/libdnf@0.63.0-11.1.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libdnf-0.63.0-11.1.el8.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2023-2602), pkg:rpm/redhat/libgcrypt@1.8.5-7.el8_6?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libgcrypt-1.8.5-7.el8_6.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2026-41990), pkg:rpm/redhat/libblkid@2.32.1-39.el8_7?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=util-linux-2.32.1-39.el8_7.src.rpm [transitive via pkg:rpm/redhat/libusbx@1.0.23-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libusbx-1.0.23-4.el8.src.rpm] (CVE-2026-3184), pkg:rpm/redhat/libcap@2.48-4.el8?arch=x86_64\u0026distro=rhel-8.7\u0026upstream=libcap-2.48-4.el8.src.rpm [transitive via pkg:rpm/redhat/shadow-utils@4.6-17.el8?arch=x86_64\u0026distro=rhel-8.7\u0026epoch=2\u0026upstream=shadow-utils-4.6-17.el8.src.rpm] (CVE-2023-2602)", "name": "rhtpa_low_vulnerabilities", "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" }, "vulnerabilities_number": 44 } } ] } ] {"vulnerabilities":{"critical":13,"high":163,"medium":258,"low":44,"unknown":0},"unpatched_vulnerabilities":{"critical":0,"high":0,"medium":0,"low":0,"unknown":0}} {"image": {"pullspec": "quay.io/rhtap_qe/default-tenant/java-quarkus-177865629:c15068056759a0072fd723091486928ae1443e26", "digests": ["sha256:d192bb0df18b1fd3b3ccff5281773a40f40538565512994a6b68b8e364f1a7ce"]}} {"result":"SUCCESS","timestamp":"2026-05-13T07:21:55+00:00","note":"Task tpa-scan completed: Refer to Tekton task result SCAN_OUTPUT for vulnerabilities scanned by TPA.","namespace":"default","successes":0,"failures":0,"warnings":0}