Description
## Summary
The product includes vulnerable components (e.g., framework libraries) that may be identified and exploited with automated tools.
## Vulnerability Details
**CVEID: **[CVE-2021-3541](<https://vulners.com/cve/CVE-2021-3541>)
**DESCRIPTION: **GNOME libxml2 is vulnerable to a denial of service, caused by an exponential entity expansion attack which bypasses all existing protection mechanisms. A remote authenticated attacker could exploit this vulnerability to consume all available resources.
CVSS Base score: 6.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/204818](<https://exchange.xforce.ibmcloud.com/vulnerabilities/204818>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2021-3516](<https://vulners.com/cve/CVE-2021-3516>)
**DESCRIPTION: **libxml2 could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in xmlEncodeEntitiesInternal() in entities.c. By persuading a victim to open a specially crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 7.8
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/202838](<https://exchange.xforce.ibmcloud.com/vulnerabilities/202838>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2021-3520](<https://vulners.com/cve/CVE-2021-3520>)
**DESCRIPTION: **lz4 could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow. By sending a specially crafted file, an attacker could invoke memmove() on a negative size argument leading to memory corruption and trigger an out-of-bounds write or cause the library to crash.
CVSS Base score: 8.6
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/202592](<https://exchange.xforce.ibmcloud.com/vulnerabilities/202592>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)
**CVEID: **[CVE-2017-14502](<https://vulners.com/cve/CVE-2017-14502>)
**DESCRIPTION: **libarchive is vulnerable to a buffer overflow, caused by improper bounds checking by the read_header function in archive_read_support_format_rar.c. By persuading a victim to open a specially-crafted RAR file, a remote attacker could overflow a buffer and execute arbitrary code on the system.
CVSS Base score: 7.8
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/132123](<https://exchange.xforce.ibmcloud.com/vulnerabilities/132123>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2021-20271](<https://vulners.com/cve/CVE-2021-20271>)
**DESCRIPTION: **RPM could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the signature check function. By persuading a victim to open a specially-crafted package file, an attacker could exploit this vulnerability to cause RPM database corruption and execute arbitrary code on the system.
CVSS Base score: 6.7
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/198961](<https://exchange.xforce.ibmcloud.com/vulnerabilities/198961>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2021-33503](<https://vulners.com/cve/CVE-2021-33503>)
**DESCRIPTION: **urllib3 is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw due to catastrophic backtracking. By sending a specially-crafted URL request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/203109](<https://exchange.xforce.ibmcloud.com/vulnerabilities/203109>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2019-20387](<https://vulners.com/cve/CVE-2019-20387>)
**DESCRIPTION: **libsolv is vulnerable to a denial of service, caused by a heap-based buffer over-read in the repodata_schema2id function in repodata.c. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/175508](<https://exchange.xforce.ibmcloud.com/vulnerabilities/175508>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2020-29361](<https://vulners.com/cve/CVE-2020-29361>)
**DESCRIPTION: **p11-glue p11-kit are vulnerable to a denial of service, caused by multiple integer overflows when allocating memory for arrays of attributes and object identifiers. By sending a specially-crafted request using realloc or calloc function, an attacker could exploit this vulnerability to cause a denial of service or possibly execute arbitrary code on the system.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/193532](<https://exchange.xforce.ibmcloud.com/vulnerabilities/193532>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2020-29363](<https://vulners.com/cve/CVE-2020-29363>)
**DESCRIPTION: **p11-glue p11-kit is vulnerable to a denial of service, caused by a heap-based buffer overflow in the RPC protocol. By sending a serialized byte array in a CK_ATTRIBUTE, a remote attacker could overflow a buffer and cause a denial of service.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/193534](<https://exchange.xforce.ibmcloud.com/vulnerabilities/193534>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2020-15358](<https://vulners.com/cve/CVE-2020-15358>)
**DESCRIPTION: **SQLite is vulnerable to a denial of service, caused by a heap-based buffer overflow in the mishandling of query-flattener optimization in select.c. By sending a specially-crafted query, a local authenticated attacker could overflow a buffer and cause the application to crash.
CVSS Base score: 5.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/184103](<https://exchange.xforce.ibmcloud.com/vulnerabilities/184103>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2020-13776](<https://vulners.com/cve/CVE-2020-13776>)
**DESCRIPTION: **systemd could allow a local authenticated attacker to gain elevated privileges on the system, caused by the mishandling of numerical usernames. By sending a specially-crafted request, an attacker could exploit this vulnerability to gain elevated privileges as root.
CVSS Base score: 6.7
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/184600](<https://exchange.xforce.ibmcloud.com/vulnerabilities/184600>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2019-18276](<https://vulners.com/cve/CVE-2019-18276>)
**DESCRIPTION: **GNU Bash could allow a remote authenticated attacker to gain elevated privileges on the system, caused by a flaw in the disable_priv_mode in shell.c. By sending a specially-crafted command, an attacker could exploit this vulnerability to escalate privileges.
CVSS Base score: 8.8
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/172331](<https://exchange.xforce.ibmcloud.com/vulnerabilities/172331>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2020-9951](<https://vulners.com/cve/CVE-2020-9951>)
**DESCRIPTION: **Apple Safari could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in the WebKit component. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 8.8
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/188409](<https://exchange.xforce.ibmcloud.com/vulnerabilities/188409>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2020-13543](<https://vulners.com/cve/CVE-2020-13543>)
**DESCRIPTION: **Webkit WebKitGTK could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in the WebSocket functionality. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code or cause the application to crash.
CVSS Base score: 8.8
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/192461](<https://exchange.xforce.ibmcloud.com/vulnerabilities/192461>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2020-13584](<https://vulners.com/cve/CVE-2020-13584>)
**DESCRIPTION: **Webkit WebKitGTK could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in the ImageDecoderGStreamer functionality. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code or cause the application to crash.
CVSS Base score: 8.8
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/192463](<https://exchange.xforce.ibmcloud.com/vulnerabilities/192463>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2019-14889](<https://vulners.com/cve/CVE-2019-14889>)
**DESCRIPTION: **libssh could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a flaw in the ssh_scp_new(). By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system.
CVSS Base score: 8.8
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/173891](<https://exchange.xforce.ibmcloud.com/vulnerabilities/173891>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2019-20916](<https://vulners.com/cve/CVE-2019-20916>)
**DESCRIPTION: **pypa pip package for python could allow a remote attacker to traverse directories on the system, caused by a flaw when installing package via a specified URL. An attacker could use a specially-crafted Content-Disposition header with filename containing "dot dot" sequences (/../) to overwrite arbitrary files on the system.
CVSS Base score: 8.2
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/187855](<https://exchange.xforce.ibmcloud.com/vulnerabilities/187855>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L)
**CVEID: **[CVE-2021-20305](<https://vulners.com/cve/CVE-2021-20305>)
**DESCRIPTION: **Nettle could allow a remote attacker to bypass security restrictions, caused by a flaw related to several signature verification functions result in the Elliptic Curve Cryptography point (ECC) multiply function being invoked with out-of-range scalers. An attacker could exploit this vulnerability to force an invalid signature, causing an assertion failure or possible validation.
CVSS Base score: 8.1
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/199653](<https://exchange.xforce.ibmcloud.com/vulnerabilities/199653>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2020-14352](<https://vulners.com/cve/CVE-2020-14352>)
**DESCRIPTION: **Librepo could allow a remote authenticated attacker to traverse directories on the system, caused by the failure to sanitize paths in remote repository metadata. An attacker could send a specially-crafted URL request containing directory traversal sequences to copy files outside of the destination directory and compromise the system.
CVSS Base score: 8
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/187676](<https://exchange.xforce.ibmcloud.com/vulnerabilities/187676>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2020-24977](<https://vulners.com/cve/CVE-2020-24977>)
**DESCRIPTION: **GNOME libxml2 is vulnerable to a buffer overflow, caused by improper bounds checking by the xmlEncodeEntitiesInternal function in libxml2/entities.c. By persuading a victim to open a specially-crafted file, a remote attacker could overflow a buffer and execute arbitrary code on the system.
CVSS Base score: 7.8
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/187847](<https://exchange.xforce.ibmcloud.com/vulnerabilities/187847>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2020-8285](<https://vulners.com/cve/CVE-2020-8285>)
**DESCRIPTION: **cURL libcurl is vulnerable to a denial of service, caused by a stack-based buffer overflow in the wildcard matching function. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/192855](<https://exchange.xforce.ibmcloud.com/vulnerabilities/192855>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2020-8286](<https://vulners.com/cve/CVE-2020-8286>)
**DESCRIPTION: **cURL libcurl could allow a remote attacker to bypass security restrictions, caused by improper OCSP response verification. By sending a specially-crafted request, an attacker could exploit this vulnerability to breach a TLS server.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/192856](<https://exchange.xforce.ibmcloud.com/vulnerabilities/192856>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)
**CVEID: **[CVE-2019-25013](<https://vulners.com/cve/CVE-2019-25013>)
**DESCRIPTION: **GNU glibc is vulnerable to a denial of service, caused by a buffer over-read in iconv feature. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a SIGSEGV.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/194579](<https://exchange.xforce.ibmcloud.com/vulnerabilities/194579>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2021-3326](<https://vulners.com/cve/CVE-2021-3326>)
**DESCRIPTION: **GNU C Library (aka glibc or libc6) is vulnerable to a denial of service, caused by an assertion failure when processing invalid input sequences in the ISO-2022-JP-3 encoding in the iconv function. By sending specially-crafted input, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/195732](<https://exchange.xforce.ibmcloud.com/vulnerabilities/195732>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2020-28196](<https://vulners.com/cve/CVE-2020-28196>)
**DESCRIPTION: **MIT Kerberos 5 (aka krb5) is vulnerable to a denial of service, caused by an unbounded recursion flaw in lib/krb5/asn.1/asn1_encode.c. By sending a specially-crafted ASN.1-encoded Kerberos message, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/191321](<https://exchange.xforce.ibmcloud.com/vulnerabilities/191321>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2020-7595](<https://vulners.com/cve/CVE-2020-7595>)
**DESCRIPTION: **GNOME libxml2 is vulnerable to a denial of service, caused by an error in xmlStringLenDecodeEntities in parser.c. An attacker could exploit this vulnerability to cause the application to enter into an infinite loop.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/175333](<https://exchange.xforce.ibmcloud.com/vulnerabilities/175333>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2021-3449](<https://vulners.com/cve/CVE-2021-3449>)
**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference in signature_algorithms processing. By sending a specially crafted renegotiation ClientHello message from a client, a remote attacker could exploit this vulnerability to cause the TLS server to crash.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/198752](<https://exchange.xforce.ibmcloud.com/vulnerabilities/198752>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2020-14422](<https://vulners.com/cve/CVE-2020-14422>)
**DESCRIPTION: **Python is vulnerable to a denial of service, caused by improper computing hash values in the IPv4Interface and IPv6Interface classes in Lib/ipaddress.py. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/184320](<https://exchange.xforce.ibmcloud.com/vulnerabilities/184320>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2020-13434](<https://vulners.com/cve/CVE-2020-13434>)
**DESCRIPTION: **SQLite is vulnerable to a denial of service, caused by an integer overflow in the sqlite3_str_vappendf function. By sending a specially-crafted request, a remote attacker could overflow a buffer and cause a denial of service.
CVSS Base score: 7.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/182405](<https://exchange.xforce.ibmcloud.com/vulnerabilities/182405>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2020-13777](<https://vulners.com/cve/CVE-2020-13777>)
**DESCRIPTION: **GnuTLS could allow a remote attacker to obtain sensitive information, caused by the use of incorrect cryptography for encrypting a session ticket. By using man-in-the-middle attack techniques, an attacker could exploit this vulnerability to obtain previous conversations in TLS and bypass the authentication process.
CVSS Base score: 7.4
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/183032](<https://exchange.xforce.ibmcloud.com/vulnerabilities/183032>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N)
**CVEID: **[CVE-2021-3450](<https://vulners.com/cve/CVE-2021-3450>)
**DESCRIPTION: **OpenSSL could allow a remote attacker to bypass security restrictions, caused by a a missing check in the validation logic of X.509 certificate chains by the X509_V_FLAG_X509_STRICT flag. By using any valid certificate or certificate chain to sign a specially crafted certificate, an attacker could bypass the check that non-CA certificates must not be able to issue other certificates and override the default purpose.
CVSS Base score: 7.4
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/198754](<https://exchange.xforce.ibmcloud.com/vulnerabilities/198754>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H)
**CVEID: **[CVE-2019-9169](<https://vulners.com/cve/CVE-2019-9169>)
**DESCRIPTION: **GNU glibc is vulnerable to a heap-based buffer overflow, caused by a buffer over-read flaw in the proceed_next_node function in posix/regexec.c. By sending a specially-crafted argument using a case-insensitive regular-expression match, a remote attacker could overflow a buffer and execute arbitrary code on the system.
CVSS Base score: 7.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/157800](<https://exchange.xforce.ibmcloud.com/vulnerabilities/157800>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
**CVEID: **[CVE-2019-14866](<https://vulners.com/cve/CVE-2019-14866>)
**DESCRIPTION: **GNU cpio could allow a local authenticated attacker to gain elevated privileges on the system, caused by the failure to properly validate input files when generating TAR archives. An attacker could exploit this vulnerability to inject any tar content and compromise the system.
CVSS Base score: 6.7
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/171509](<https://exchange.xforce.ibmcloud.com/vulnerabilities/171509>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)
**CVEID: **[CVE-2020-8284](<https://vulners.com/cve/CVE-2020-8284>)
**DESCRIPTION: **cURL libcurl could allow a remote attacker to obtain sensitive information, caused by improper validation of FTP PASV responses. By persuading a victim to connect a specially-crafted server, an attacker could exploit this vulnerability to obtain sensitive information about services, and use this information to launch further attacks against the affected system.
CVSS Base score: 6.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/192854](<https://exchange.xforce.ibmcloud.com/vulnerabilities/192854>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N)
**CVEID: **[CVE-2020-26116](<https://vulners.com/cve/CVE-2020-26116>)
**DESCRIPTION: **Python is vulnerable to CRLF injection, caused by improper validation of user-supplied input in http.client. By inserting CR and LF control characters in the first argument of HTTPConnection.request, a remote attacker could exploit this vulnerability to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.
CVSS Base score: 6.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/189404](<https://exchange.xforce.ibmcloud.com/vulnerabilities/189404>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
**CVEID: **[CVE-2020-9948](<https://vulners.com/cve/CVE-2020-9948>)
**DESCRIPTION: **Apple Safari could allow a remote attacker to execute arbitrary code on the system, caused by a type confusion in the WebKit component. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 6.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/188410](<https://exchange.xforce.ibmcloud.com/vulnerabilities/188410>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)
**CVEID: **[CVE-2020-9983](<https://vulners.com/cve/CVE-2020-9983>)
**DESCRIPTION: **Apple Safari could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write in the WebKit component. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base score: 6.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/188412](<https://exchange.xforce.ibmcloud.com/vulnerabilities/188412>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L)
**CVEID: **[CVE-2019-16935](<https://vulners.com/cve/CVE-2019-16935>)
**DESCRIPTION: **Python is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the python/Lib/DocXMLRPCServer.py. A remote attacker could exploit this vulnerability using the server_title field to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
CVSS Base score: 6.1
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/168612](<https://exchange.xforce.ibmcloud.com/vulnerabilities/168612>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N)
**CVEID: **[CVE-2020-24659](<https://vulners.com/cve/CVE-2020-24659>)
**DESCRIPTION: **GnuTLS is vulnerable to a denial of service, caused by a NULL pointer dereference. By sending specially-crafted messages, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 5.9
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/187828](<https://exchange.xforce.ibmcloud.com/vulnerabilities/187828>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2019-13627](<https://vulners.com/cve/CVE-2019-13627>)
**DESCRIPTION: **libgcrypt20 cryptographic library could allow a remote attacker to obtain sensitive information, caused by a ECDSA timing attack. An attacker could exploit this vulnerability to obtain private key information, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.9
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/167675](<https://exchange.xforce.ibmcloud.com/vulnerabilities/167675>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
**CVEID: **[CVE-2021-23336](<https://vulners.com/cve/CVE-2021-23336>)
**DESCRIPTION: **Python CPython could allow a remote attacker to bypass security restrictions, caused by a web cache poisoning flaw via urllib.parse.parse_qsl and urllib.parse.parse_qs. By sending a specially-crafted request parameter cloaking, an attacker could exploit this vulnerability to cause a difference in the interpretation of the request between the proxy and the server.
CVSS Base score: 5.9
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/196808](<https://exchange.xforce.ibmcloud.com/vulnerabilities/196808>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H)
**CVEID: **[CVE-2020-27618](<https://vulners.com/cve/CVE-2020-27618>)
**DESCRIPTION: **GNU C Library (aka glibc or libc6) is vulnerable to a denial of service, caused by an error when processing some invalid inputs from several IBM character sets in the iconv function. By sending invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings, a local authenticated attacker could exploit this vulnerability to cause the application to enter into an infinite loop.
CVSS Base score: 5.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/196446](<https://exchange.xforce.ibmcloud.com/vulnerabilities/196446>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2019-20907](<https://vulners.com/cve/CVE-2019-20907>)
**DESCRIPTION: **Python is vulnerable to a denial of service, caused by a flaw in the tarfile module in Lib/tarfile.py. By persuading a victim to open a specially-craft a TAR archive, a remote attacker could exploit this vulnerability to cause the application to enter into an infinite loop.
CVSS Base score: 5.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/185442](<https://exchange.xforce.ibmcloud.com/vulnerabilities/185442>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H)
**CVEID: **[CVE-2020-8927](<https://vulners.com/cve/CVE-2020-8927>)
**DESCRIPTION: **Brotli is vulnerable to buffer overflow. By controlling the input length of a "one-shot" decompression request to a script, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/188304](<https://exchange.xforce.ibmcloud.com/vulnerabilities/188304>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
**CVEID: **[CVE-2020-8177](<https://vulners.com/cve/CVE-2020-8177>)
**DESCRIPTION: **cURL could allow a remote attacker to overwrite arbitrary files on the system, caused by the improper handling of certain parameters when using -J (--remote-header-name) and -I (--include) in the same command line. An attacker could exploit this vulnerability to overwrite a local file.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/183931](<https://exchange.xforce.ibmcloud.com/vulnerabilities/183931>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
**CVEID: **[CVE-2020-8231](<https://vulners.com/cve/CVE-2020-8231>)
**DESCRIPTION: **cURL libcurl could allow a remote attacker to obtain sensitive information, caused by the improper handling of the CURLOPT_CONNECT_ONLY option. The raw data is sent over that connection to the wrong destination. An attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/186954](<https://exchange.xforce.ibmcloud.com/vulnerabilities/186954>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
**CVEID: **[CVE-2019-19906](<https://vulners.com/cve/CVE-2019-19906>)
**DESCRIPTION: **cyrus-sasl is vulnerable to a denial of service, caused by an off-by-one error in _sasl_add_string in common.c. By sending a malformed LDAP packet, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/173382](<https://exchange.xforce.ibmcloud.com/vulnerabilities/173382>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2019-15903](<https://vulners.com/cve/CVE-2019-15903>)
**DESCRIPTION: **libexpat is vulnerable to a denial of service, caused by a heap-based buffer over-read in XML_GetCurrentLineNumber. By using a specially-crafted XML input, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/166560](<https://exchange.xforce.ibmcloud.com/vulnerabilities/166560>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2016-10228](<https://vulners.com/cve/CVE-2016-10228>)
**DESCRIPTION: **GNU C Library (glibc) is vulnerable to a denial of service, caused by an error in the iconv program. By processing invalid multi-byte input sequences, a remote attacker could exploit this vulnerability to cause the application to enter into an infinite loop.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/124078](<https://exchange.xforce.ibmcloud.com/vulnerabilities/124078>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2019-13050](<https://vulners.com/cve/CVE-2019-13050>)
**DESCRIPTION: **GNU Privacy Guard (GnuPG) is vulnerable to a denial of service, caused by a certificate spamming attack when referring to a host on the SKS keyserver network in the keyserver configuration. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/166417](<https://exchange.xforce.ibmcloud.com/vulnerabilities/166417>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2020-1730](<https://vulners.com/cve/CVE-2020-1730>)
**DESCRIPTION: **libssh is vulnerable to a denial of service, caused by the use of uninitialized AES-CTR ciphers. A remote attacker could exploit this vulnerability to crash the implemented counterpart.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/179361](<https://exchange.xforce.ibmcloud.com/vulnerabilities/179361>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2020-29362](<https://vulners.com/cve/CVE-2020-29362>)
**DESCRIPTION: **p11-glue p11-kit could allow a remote attacker to obtain sensitive information, caused by a heap-based buffer over-read flaw in the RPC protocol. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain up to 4 bytes of memory past the heap allocation, and use this information to launch further attacks against the affected system.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/193533](<https://exchange.xforce.ibmcloud.com/vulnerabilities/193533>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
**CVEID: **[CVE-2019-20454](<https://vulners.com/cve/CVE-2019-20454>)
**DESCRIPTION: **PCRE is vulnerable to a denial of service, caused by an out-of-bounds read in the do_extuni_no_utf function in pcre2_jit_compile.c. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/176437](<https://exchange.xforce.ibmcloud.com/vulnerabilities/176437>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2020-8492](<https://vulners.com/cve/CVE-2020-8492>)
**DESCRIPTION: **Python is vulnerable to a denial of service, caused by a flaw in the urllib.request.AbstractBasicAuthHandler. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a Regular Expression Denial of Service (ReDoS).
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/175462](<https://exchange.xforce.ibmcloud.com/vulnerabilities/175462>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2020-27619](<https://vulners.com/cve/CVE-2020-27619>)
**DESCRIPTION: **An unspecified error with CJK codec tests call eval() on content retrieved throug HTTP in multibytecodec_support.py in Python has an unknown impact and attack vector.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/190408](<https://exchange.xforce.ibmcloud.com/vulnerabilities/190408>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
**CVEID: **[CVE-2021-23240](<https://vulners.com/cve/CVE-2021-23240>)
**DESCRIPTION: **sudo could allow a local authenticated attacker to launch a symlink attack. The selinux_edit_copy_tfiles() and selinux_edit_create_tfiles functions creates temporary files insecurely. An attacker could exploit this vulnerability by creating a symbolic link from a temporary file to various files on the system, which could allow the attacker to overwrite arbitrary files on the system with elevated privileges.
CVSS Base score: 5.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/194530](<https://exchange.xforce.ibmcloud.com/vulnerabilities/194530>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L)
**CVEID: **[CVE-2019-3842](<https://vulners.com/cve/CVE-2019-3842>)
**DESCRIPTION: **systemd could allow a local authenticated attacker to gain elevated privileges on the system, caused by the failure to properly sanitize the environment before using the XDG_SEAT variable by pam_systemd. By spoofing an active session to PolicyKit, an authenticated attacker could exploit this vulnerability to gain additional PolicyKit privileges.
CVSS Base score: 4.5
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/159257](<https://exchange.xforce.ibmcloud.com/vulnerabilities/159257>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L)
**CVEID: **[CVE-2018-1000858](<https://vulners.com/cve/CVE-2018-1000858>)
**DESCRIPTION: **GnuPG is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input by dirmngr. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVSS Base score: 4.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/154528](<https://exchange.xforce.ibmcloud.com/vulnerabilities/154528>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N)
**CVEID: **[CVE-2020-11080](<https://vulners.com/cve/CVE-2020-11080>)
**DESCRIPTION: **Node.js is vulnerable to a denial of service, caused by an error in the HTTP/2 session frame which is limited to 32 settings by default. By sending overly large HTTP/2 SETTINGS frames, an attacker could exploit this vulnerability to consume all available CPU resources.
CVSS Base score: 3.7
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/182815](<https://exchange.xforce.ibmcloud.com/vulnerabilities/182815>) for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2018-20843](<https://vulners.com/cve/CVE-2018-20843>)
**DESCRIPTION: **libexpat is vulnerable to a denial of service, caused by an error in the XML parser. By persuading a victim to open a specially-crafted file, a remote attacker could exploit this vulnerability to consume all available CPU resources.
CVSS Base score: 3.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/163073](<https://exchange.xforce.ibmcloud.com/vulnerabilities/163073>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2019-13012](<https://vulners.com/cve/CVE-2019-13012>)
**DESCRIPTION: **GNOME GLib could allow a local attacker to bypass security restrictions, caused by improper permission control in the keyfile settings backend. An attacker could exploit this vulnerability to bypass access restrictions.
CVSS Base score: 3.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/166666](<https://exchange.xforce.ibmcloud.com/vulnerabilities/166666>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N)
**CVEID: **[CVE-2019-19221](<https://vulners.com/cve/CVE-2019-19221>)
**DESCRIPTION: **libarchive is vulnerable to a denial of service, caused by an out-of-bounds read in the archive_wstring_append_from_mbs in archive_string.c. By persuading a victim to open a specially-crafted file, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVSS Base score: 3.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/172119](<https://exchange.xforce.ibmcloud.com/vulnerabilities/172119>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2019-2708](<https://vulners.com/cve/CVE-2019-2708>)
**DESCRIPTION: **An unspecified vulnerability in Oracle Berkeley DB related to the Data Store component could allow an authenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors.
CVSS Base score: 3.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/159800](<https://exchange.xforce.ibmcloud.com/vulnerabilities/159800>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2019-19956](<https://vulners.com/cve/CVE-2019-19956>)
**DESCRIPTION: **libxml2 is vulnerable to a denial of service, caused by a memory leak in xmlParseBalancedChunkMemoryRecover in parser.c. By persuading a victim to open a specially crafted file, a remote attacker could exploit this vulnerability to cause the application to crash.
CVSS Base score: 3.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/173518](<https://exchange.xforce.ibmcloud.com/vulnerabilities/173518>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L)
**CVEID: **[CVE-2019-20388](<https://vulners.com/cve/CVE-2019-20388>)
**DESCRIPTION: **GNOME libxml2 could allow a remote attacker to obtain sensitive information, caused by a xmlSchemaValidateStream memory leak in xmlSchemaPreRun in xmlschemas.c. By persuading a victim to open a specially crafted file, an attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base score: 3.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/175539](<https://exchange.xforce.ibmcloud.com/vulnerabilities/175539>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N)
**CVEID: **[CVE-2021-23239](<https://vulners.com/cve/CVE-2021-23239>)
**DESCRIPTION: **sudo could allow a local authenticated attacker to obtain sensitive information, caused by a race condition in sudoedit. By using symlink attack techniques, an attacker could exploit this vulnerability to obtain directory information, and use this information to launch further attacks against the affected system.
CVSS Base score: 3.3
CVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/194529](<https://exchange.xforce.ibmcloud.com/vulnerabilities/194529>) for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)
## Affected Products and Versions
IBM QRadar SIEM 7.3.0 to 7.3.3 Fix Pack 9
IBM QRadar SIEM 7.4.0 to 7.4.3 Fix Pack 2
## Remediation/Fixes
[QRadar / QRM / QVM / QRIF / QNI 7.3.3 Fix Pack 10](<https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=IBM%20Security&product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=7.4.0&platform=Linux&function=fixId&fixids=7.3.3-QRADAR-QRSIEM-20211125190208&includeRequisites=1&includeSupersedes=0&downloadMethod=http&source=SAR> "" )
QRadar / QRM / QVM / QRIF / QNI 7.4.3 Fix Pack 3
[QRadar / QRM / QVM / QRIF / QNI 7.4.3 Fix Pack 4](<https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=IBM%20Security&product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=7.4.0&platform=Linux&function=fixId&fixids=7.4.3-QRADAR-QRSIEM-20211113154131&includeRequisites=1&includeSupersedes=0&downloadMethod=http> "" )
**Note**: Version 7.4.3 Fix Pack 3 is only available to QRadar on Cloud users. QRadar 7.4.3 Fix Pack 3 [was removed for on-premise QRadar SIEM users](<https://www.ibm.com/support/pages/node/6509562>).
## Workarounds and Mitigations
None
##
Affected Software
Related
{"id": "BDFA432EA62E6EFDD1DA5F84B4EE926C27FCF1125443F9D0EC5005B0FEE74C89", "vendorId": null, "type": "ibm", "bulletinFamily": "software", "title": "Security Bulletin: IBM QRadar SIEM Application Framework Base Image is vulnerable to using components with Known Vulnerabilities", "description": "## Summary\n\nThe product includes vulnerable components (e.g., framework libraries) that may be identified and exploited with automated tools.\n\n## Vulnerability Details\n\n**CVEID: **[CVE-2021-3541](<https://vulners.com/cve/CVE-2021-3541>) \n**DESCRIPTION: **GNOME libxml2 is vulnerable to a denial of service, caused by an exponential entity expansion attack which bypasses all existing protection mechanisms. A remote authenticated attacker could exploit this vulnerability to consume all available resources. \nCVSS Base score: 6.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/204818](<https://exchange.xforce.ibmcloud.com/vulnerabilities/204818>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2021-3516](<https://vulners.com/cve/CVE-2021-3516>) \n**DESCRIPTION: **libxml2 could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in xmlEncodeEntitiesInternal() in entities.c. By persuading a victim to open a specially crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. \nCVSS Base score: 7.8 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/202838](<https://exchange.xforce.ibmcloud.com/vulnerabilities/202838>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2021-3520](<https://vulners.com/cve/CVE-2021-3520>) \n**DESCRIPTION: **lz4 could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow. By sending a specially crafted file, an attacker could invoke memmove() on a negative size argument leading to memory corruption and trigger an out-of-bounds write or cause the library to crash. \nCVSS Base score: 8.6 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/202592](<https://exchange.xforce.ibmcloud.com/vulnerabilities/202592>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H) \n \n**CVEID: **[CVE-2017-14502](<https://vulners.com/cve/CVE-2017-14502>) \n**DESCRIPTION: **libarchive is vulnerable to a buffer overflow, caused by improper bounds checking by the read_header function in archive_read_support_format_rar.c. By persuading a victim to open a specially-crafted RAR file, a remote attacker could overflow a buffer and execute arbitrary code on the system. \nCVSS Base score: 7.8 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/132123](<https://exchange.xforce.ibmcloud.com/vulnerabilities/132123>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2021-20271](<https://vulners.com/cve/CVE-2021-20271>) \n**DESCRIPTION: **RPM could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the signature check function. By persuading a victim to open a specially-crafted package file, an attacker could exploit this vulnerability to cause RPM database corruption and execute arbitrary code on the system. \nCVSS Base score: 6.7 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/198961](<https://exchange.xforce.ibmcloud.com/vulnerabilities/198961>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2021-33503](<https://vulners.com/cve/CVE-2021-33503>) \n**DESCRIPTION: **urllib3 is vulnerable to a denial of service, caused by a regular expression denial of service (ReDoS) flaw due to catastrophic backtracking. By sending a specially-crafted URL request, a remote attacker could exploit this vulnerability to cause a denial of service condition. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/203109](<https://exchange.xforce.ibmcloud.com/vulnerabilities/203109>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2019-20387](<https://vulners.com/cve/CVE-2019-20387>) \n**DESCRIPTION: **libsolv is vulnerable to a denial of service, caused by a heap-based buffer over-read in the repodata_schema2id function in repodata.c. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause the application to crash. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/175508](<https://exchange.xforce.ibmcloud.com/vulnerabilities/175508>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2020-29361](<https://vulners.com/cve/CVE-2020-29361>) \n**DESCRIPTION: **p11-glue p11-kit are vulnerable to a denial of service, caused by multiple integer overflows when allocating memory for arrays of attributes and object identifiers. By sending a specially-crafted request using realloc or calloc function, an attacker could exploit this vulnerability to cause a denial of service or possibly execute arbitrary code on the system. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/193532](<https://exchange.xforce.ibmcloud.com/vulnerabilities/193532>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2020-29363](<https://vulners.com/cve/CVE-2020-29363>) \n**DESCRIPTION: **p11-glue p11-kit is vulnerable to a denial of service, caused by a heap-based buffer overflow in the RPC protocol. By sending a serialized byte array in a CK_ATTRIBUTE, a remote attacker could overflow a buffer and cause a denial of service. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/193534](<https://exchange.xforce.ibmcloud.com/vulnerabilities/193534>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2020-15358](<https://vulners.com/cve/CVE-2020-15358>) \n**DESCRIPTION: **SQLite is vulnerable to a denial of service, caused by a heap-based buffer overflow in the mishandling of query-flattener optimization in select.c. By sending a specially-crafted query, a local authenticated attacker could overflow a buffer and cause the application to crash. \nCVSS Base score: 5.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/184103](<https://exchange.xforce.ibmcloud.com/vulnerabilities/184103>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2020-13776](<https://vulners.com/cve/CVE-2020-13776>) \n**DESCRIPTION: **systemd could allow a local authenticated attacker to gain elevated privileges on the system, caused by the mishandling of numerical usernames. By sending a specially-crafted request, an attacker could exploit this vulnerability to gain elevated privileges as root. \nCVSS Base score: 6.7 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/184600](<https://exchange.xforce.ibmcloud.com/vulnerabilities/184600>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2019-18276](<https://vulners.com/cve/CVE-2019-18276>) \n**DESCRIPTION: **GNU Bash could allow a remote authenticated attacker to gain elevated privileges on the system, caused by a flaw in the disable_priv_mode in shell.c. By sending a specially-crafted command, an attacker could exploit this vulnerability to escalate privileges. \nCVSS Base score: 8.8 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/172331](<https://exchange.xforce.ibmcloud.com/vulnerabilities/172331>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2020-9951](<https://vulners.com/cve/CVE-2020-9951>) \n**DESCRIPTION: **Apple Safari could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in the WebKit component. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system. \nCVSS Base score: 8.8 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/188409](<https://exchange.xforce.ibmcloud.com/vulnerabilities/188409>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2020-13543](<https://vulners.com/cve/CVE-2020-13543>) \n**DESCRIPTION: **Webkit WebKitGTK could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in the WebSocket functionality. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code or cause the application to crash. \nCVSS Base score: 8.8 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/192461](<https://exchange.xforce.ibmcloud.com/vulnerabilities/192461>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2020-13584](<https://vulners.com/cve/CVE-2020-13584>) \n**DESCRIPTION: **Webkit WebKitGTK could allow a remote attacker to execute arbitrary code on the system, caused by a use-after-free in the ImageDecoderGStreamer functionality. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code or cause the application to crash. \nCVSS Base score: 8.8 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/192463](<https://exchange.xforce.ibmcloud.com/vulnerabilities/192463>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2019-14889](<https://vulners.com/cve/CVE-2019-14889>) \n**DESCRIPTION: **libssh could allow a remote authenticated attacker to execute arbitrary commands on the system, caused by a flaw in the ssh_scp_new(). By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary commands on the system. \nCVSS Base score: 8.8 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/173891](<https://exchange.xforce.ibmcloud.com/vulnerabilities/173891>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2019-20916](<https://vulners.com/cve/CVE-2019-20916>) \n**DESCRIPTION: **pypa pip package for python could allow a remote attacker to traverse directories on the system, caused by a flaw when installing package via a specified URL. An attacker could use a specially-crafted Content-Disposition header with filename containing \"dot dot\" sequences (/../) to overwrite arbitrary files on the system. \nCVSS Base score: 8.2 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/187855](<https://exchange.xforce.ibmcloud.com/vulnerabilities/187855>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L) \n \n**CVEID: **[CVE-2021-20305](<https://vulners.com/cve/CVE-2021-20305>) \n**DESCRIPTION: **Nettle could allow a remote attacker to bypass security restrictions, caused by a flaw related to several signature verification functions result in the Elliptic Curve Cryptography point (ECC) multiply function being invoked with out-of-range scalers. An attacker could exploit this vulnerability to force an invalid signature, causing an assertion failure or possible validation. \nCVSS Base score: 8.1 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/199653](<https://exchange.xforce.ibmcloud.com/vulnerabilities/199653>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2020-14352](<https://vulners.com/cve/CVE-2020-14352>) \n**DESCRIPTION: **Librepo could allow a remote authenticated attacker to traverse directories on the system, caused by the failure to sanitize paths in remote repository metadata. An attacker could send a specially-crafted URL request containing directory traversal sequences to copy files outside of the destination directory and compromise the system. \nCVSS Base score: 8 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/187676](<https://exchange.xforce.ibmcloud.com/vulnerabilities/187676>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2020-24977](<https://vulners.com/cve/CVE-2020-24977>) \n**DESCRIPTION: **GNOME libxml2 is vulnerable to a buffer overflow, caused by improper bounds checking by the xmlEncodeEntitiesInternal function in libxml2/entities.c. By persuading a victim to open a specially-crafted file, a remote attacker could overflow a buffer and execute arbitrary code on the system. \nCVSS Base score: 7.8 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/187847](<https://exchange.xforce.ibmcloud.com/vulnerabilities/187847>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2020-8285](<https://vulners.com/cve/CVE-2020-8285>) \n**DESCRIPTION: **cURL libcurl is vulnerable to a denial of service, caused by a stack-based buffer overflow in the wildcard matching function. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause the application to crash. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/192855](<https://exchange.xforce.ibmcloud.com/vulnerabilities/192855>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2020-8286](<https://vulners.com/cve/CVE-2020-8286>) \n**DESCRIPTION: **cURL libcurl could allow a remote attacker to bypass security restrictions, caused by improper OCSP response verification. By sending a specially-crafted request, an attacker could exploit this vulnerability to breach a TLS server. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/192856](<https://exchange.xforce.ibmcloud.com/vulnerabilities/192856>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) \n \n**CVEID: **[CVE-2019-25013](<https://vulners.com/cve/CVE-2019-25013>) \n**DESCRIPTION: **GNU glibc is vulnerable to a denial of service, caused by a buffer over-read in iconv feature. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a SIGSEGV. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/194579](<https://exchange.xforce.ibmcloud.com/vulnerabilities/194579>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2021-3326](<https://vulners.com/cve/CVE-2021-3326>) \n**DESCRIPTION: **GNU C Library (aka glibc or libc6) is vulnerable to a denial of service, caused by an assertion failure when processing invalid input sequences in the ISO-2022-JP-3 encoding in the iconv function. By sending specially-crafted input, a remote attacker could exploit this vulnerability to cause the application to crash. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/195732](<https://exchange.xforce.ibmcloud.com/vulnerabilities/195732>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2020-28196](<https://vulners.com/cve/CVE-2020-28196>) \n**DESCRIPTION: **MIT Kerberos 5 (aka krb5) is vulnerable to a denial of service, caused by an unbounded recursion flaw in lib/krb5/asn.1/asn1_encode.c. By sending a specially-crafted ASN.1-encoded Kerberos message, a remote attacker could exploit this vulnerability to cause a denial of service condition. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/191321](<https://exchange.xforce.ibmcloud.com/vulnerabilities/191321>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2020-7595](<https://vulners.com/cve/CVE-2020-7595>) \n**DESCRIPTION: **GNOME libxml2 is vulnerable to a denial of service, caused by an error in xmlStringLenDecodeEntities in parser.c. An attacker could exploit this vulnerability to cause the application to enter into an infinite loop. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/175333](<https://exchange.xforce.ibmcloud.com/vulnerabilities/175333>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2021-3449](<https://vulners.com/cve/CVE-2021-3449>) \n**DESCRIPTION: **OpenSSL is vulnerable to a denial of service, caused by a NULL pointer dereference in signature_algorithms processing. By sending a specially crafted renegotiation ClientHello message from a client, a remote attacker could exploit this vulnerability to cause the TLS server to crash. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/198752](<https://exchange.xforce.ibmcloud.com/vulnerabilities/198752>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2020-14422](<https://vulners.com/cve/CVE-2020-14422>) \n**DESCRIPTION: **Python is vulnerable to a denial of service, caused by improper computing hash values in the IPv4Interface and IPv6Interface classes in Lib/ipaddress.py. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/184320](<https://exchange.xforce.ibmcloud.com/vulnerabilities/184320>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2020-13434](<https://vulners.com/cve/CVE-2020-13434>) \n**DESCRIPTION: **SQLite is vulnerable to a denial of service, caused by an integer overflow in the sqlite3_str_vappendf function. By sending a specially-crafted request, a remote attacker could overflow a buffer and cause a denial of service. \nCVSS Base score: 7.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/182405](<https://exchange.xforce.ibmcloud.com/vulnerabilities/182405>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2020-13777](<https://vulners.com/cve/CVE-2020-13777>) \n**DESCRIPTION: **GnuTLS could allow a remote attacker to obtain sensitive information, caused by the use of incorrect cryptography for encrypting a session ticket. By using man-in-the-middle attack techniques, an attacker could exploit this vulnerability to obtain previous conversations in TLS and bypass the authentication process. \nCVSS Base score: 7.4 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/183032](<https://exchange.xforce.ibmcloud.com/vulnerabilities/183032>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) \n \n**CVEID: **[CVE-2021-3450](<https://vulners.com/cve/CVE-2021-3450>) \n**DESCRIPTION: **OpenSSL could allow a remote attacker to bypass security restrictions, caused by a a missing check in the validation logic of X.509 certificate chains by the X509_V_FLAG_X509_STRICT flag. By using any valid certificate or certificate chain to sign a specially crafted certificate, an attacker could bypass the check that non-CA certificates must not be able to issue other certificates and override the default purpose. \nCVSS Base score: 7.4 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/198754](<https://exchange.xforce.ibmcloud.com/vulnerabilities/198754>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H) \n \n**CVEID: **[CVE-2019-9169](<https://vulners.com/cve/CVE-2019-9169>) \n**DESCRIPTION: **GNU glibc is vulnerable to a heap-based buffer overflow, caused by a buffer over-read flaw in the proceed_next_node function in posix/regexec.c. By sending a specially-crafted argument using a case-insensitive regular-expression match, a remote attacker could overflow a buffer and execute arbitrary code on the system. \nCVSS Base score: 7.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/157800](<https://exchange.xforce.ibmcloud.com/vulnerabilities/157800>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) \n \n**CVEID: **[CVE-2019-14866](<https://vulners.com/cve/CVE-2019-14866>) \n**DESCRIPTION: **GNU cpio could allow a local authenticated attacker to gain elevated privileges on the system, caused by the failure to properly validate input files when generating TAR archives. An attacker could exploit this vulnerability to inject any tar content and compromise the system. \nCVSS Base score: 6.7 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/171509](<https://exchange.xforce.ibmcloud.com/vulnerabilities/171509>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H) \n \n**CVEID: **[CVE-2020-8284](<https://vulners.com/cve/CVE-2020-8284>) \n**DESCRIPTION: **cURL libcurl could allow a remote attacker to obtain sensitive information, caused by improper validation of FTP PASV responses. By persuading a victim to connect a specially-crafted server, an attacker could exploit this vulnerability to obtain sensitive information about services, and use this information to launch further attacks against the affected system. \nCVSS Base score: 6.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/192854](<https://exchange.xforce.ibmcloud.com/vulnerabilities/192854>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N) \n \n**CVEID: **[CVE-2020-26116](<https://vulners.com/cve/CVE-2020-26116>) \n**DESCRIPTION: **Python is vulnerable to CRLF injection, caused by improper validation of user-supplied input in http.client. By inserting CR and LF control characters in the first argument of HTTPConnection.request, a remote attacker could exploit this vulnerability to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking. \nCVSS Base score: 6.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/189404](<https://exchange.xforce.ibmcloud.com/vulnerabilities/189404>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) \n \n**CVEID: **[CVE-2020-9948](<https://vulners.com/cve/CVE-2020-9948>) \n**DESCRIPTION: **Apple Safari could allow a remote attacker to execute arbitrary code on the system, caused by a type confusion in the WebKit component. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system. \nCVSS Base score: 6.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/188410](<https://exchange.xforce.ibmcloud.com/vulnerabilities/188410>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) \n \n**CVEID: **[CVE-2020-9983](<https://vulners.com/cve/CVE-2020-9983>) \n**DESCRIPTION: **Apple Safari could allow a remote attacker to execute arbitrary code on the system, caused by an out-of-bounds write in the WebKit component. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to execute arbitrary code on the system. \nCVSS Base score: 6.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/188412](<https://exchange.xforce.ibmcloud.com/vulnerabilities/188412>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L) \n \n**CVEID: **[CVE-2019-16935](<https://vulners.com/cve/CVE-2019-16935>) \n**DESCRIPTION: **Python is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the python/Lib/DocXMLRPCServer.py. A remote attacker could exploit this vulnerability using the server_title field to inject malicious script into a Web page which would be executed in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. \nCVSS Base score: 6.1 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/168612](<https://exchange.xforce.ibmcloud.com/vulnerabilities/168612>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) \n \n**CVEID: **[CVE-2020-24659](<https://vulners.com/cve/CVE-2020-24659>) \n**DESCRIPTION: **GnuTLS is vulnerable to a denial of service, caused by a NULL pointer dereference. By sending specially-crafted messages, a remote attacker could exploit this vulnerability to cause the application to crash. \nCVSS Base score: 5.9 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/187828](<https://exchange.xforce.ibmcloud.com/vulnerabilities/187828>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2019-13627](<https://vulners.com/cve/CVE-2019-13627>) \n**DESCRIPTION: **libgcrypt20 cryptographic library could allow a remote attacker to obtain sensitive information, caused by a ECDSA timing attack. An attacker could exploit this vulnerability to obtain private key information, and use this information to launch further attacks against the affected system. \nCVSS Base score: 5.9 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/167675](<https://exchange.xforce.ibmcloud.com/vulnerabilities/167675>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N) \n \n**CVEID: **[CVE-2021-23336](<https://vulners.com/cve/CVE-2021-23336>) \n**DESCRIPTION: **Python CPython could allow a remote attacker to bypass security restrictions, caused by a web cache poisoning flaw via urllib.parse.parse_qsl and urllib.parse.parse_qs. By sending a specially-crafted request parameter cloaking, an attacker could exploit this vulnerability to cause a difference in the interpretation of the request between the proxy and the server. \nCVSS Base score: 5.9 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/196808](<https://exchange.xforce.ibmcloud.com/vulnerabilities/196808>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H) \n \n**CVEID: **[CVE-2020-27618](<https://vulners.com/cve/CVE-2020-27618>) \n**DESCRIPTION: **GNU C Library (aka glibc or libc6) is vulnerable to a denial of service, caused by an error when processing some invalid inputs from several IBM character sets in the iconv function. By sending invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, IBM1399 encodings, a local authenticated attacker could exploit this vulnerability to cause the application to enter into an infinite loop. \nCVSS Base score: 5.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/196446](<https://exchange.xforce.ibmcloud.com/vulnerabilities/196446>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2019-20907](<https://vulners.com/cve/CVE-2019-20907>) \n**DESCRIPTION: **Python is vulnerable to a denial of service, caused by a flaw in the tarfile module in Lib/tarfile.py. By persuading a victim to open a specially-craft a TAR archive, a remote attacker could exploit this vulnerability to cause the application to enter into an infinite loop. \nCVSS Base score: 5.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/185442](<https://exchange.xforce.ibmcloud.com/vulnerabilities/185442>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H) \n \n**CVEID: **[CVE-2020-8927](<https://vulners.com/cve/CVE-2020-8927>) \n**DESCRIPTION: **Brotli is vulnerable to buffer overflow. By controlling the input length of a \"one-shot\" decompression request to a script, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/188304](<https://exchange.xforce.ibmcloud.com/vulnerabilities/188304>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) \n \n**CVEID: **[CVE-2020-8177](<https://vulners.com/cve/CVE-2020-8177>) \n**DESCRIPTION: **cURL could allow a remote attacker to overwrite arbitrary files on the system, caused by the improper handling of certain parameters when using -J (--remote-header-name) and -I (--include) in the same command line. An attacker could exploit this vulnerability to overwrite a local file. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/183931](<https://exchange.xforce.ibmcloud.com/vulnerabilities/183931>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) \n \n**CVEID: **[CVE-2020-8231](<https://vulners.com/cve/CVE-2020-8231>) \n**DESCRIPTION: **cURL libcurl could allow a remote attacker to obtain sensitive information, caused by the improper handling of the CURLOPT_CONNECT_ONLY option. The raw data is sent over that connection to the wrong destination. An attacker could exploit this vulnerability to obtain sensitive information. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/186954](<https://exchange.xforce.ibmcloud.com/vulnerabilities/186954>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) \n \n**CVEID: **[CVE-2019-19906](<https://vulners.com/cve/CVE-2019-19906>) \n**DESCRIPTION: **cyrus-sasl is vulnerable to a denial of service, caused by an off-by-one error in _sasl_add_string in common.c. By sending a malformed LDAP packet, a remote attacker could exploit this vulnerability to cause the application to crash. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/173382](<https://exchange.xforce.ibmcloud.com/vulnerabilities/173382>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2019-15903](<https://vulners.com/cve/CVE-2019-15903>) \n**DESCRIPTION: **libexpat is vulnerable to a denial of service, caused by a heap-based buffer over-read in XML_GetCurrentLineNumber. By using a specially-crafted XML input, a remote attacker could exploit this vulnerability to cause the application to crash. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/166560](<https://exchange.xforce.ibmcloud.com/vulnerabilities/166560>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2016-10228](<https://vulners.com/cve/CVE-2016-10228>) \n**DESCRIPTION: **GNU C Library (glibc) is vulnerable to a denial of service, caused by an error in the iconv program. By processing invalid multi-byte input sequences, a remote attacker could exploit this vulnerability to cause the application to enter into an infinite loop. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/124078](<https://exchange.xforce.ibmcloud.com/vulnerabilities/124078>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2019-13050](<https://vulners.com/cve/CVE-2019-13050>) \n**DESCRIPTION: **GNU Privacy Guard (GnuPG) is vulnerable to a denial of service, caused by a certificate spamming attack when referring to a host on the SKS keyserver network in the keyserver configuration. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/166417](<https://exchange.xforce.ibmcloud.com/vulnerabilities/166417>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2020-1730](<https://vulners.com/cve/CVE-2020-1730>) \n**DESCRIPTION: **libssh is vulnerable to a denial of service, caused by the use of uninitialized AES-CTR ciphers. A remote attacker could exploit this vulnerability to crash the implemented counterpart. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/179361](<https://exchange.xforce.ibmcloud.com/vulnerabilities/179361>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2020-29362](<https://vulners.com/cve/CVE-2020-29362>) \n**DESCRIPTION: **p11-glue p11-kit could allow a remote attacker to obtain sensitive information, caused by a heap-based buffer over-read flaw in the RPC protocol. By sending a specially-crafted request, an attacker could exploit this vulnerability to obtain up to 4 bytes of memory past the heap allocation, and use this information to launch further attacks against the affected system. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/193533](<https://exchange.xforce.ibmcloud.com/vulnerabilities/193533>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N) \n \n**CVEID: **[CVE-2019-20454](<https://vulners.com/cve/CVE-2019-20454>) \n**DESCRIPTION: **PCRE is vulnerable to a denial of service, caused by an out-of-bounds read in the do_extuni_no_utf function in pcre2_jit_compile.c. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to cause the application to crash. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/176437](<https://exchange.xforce.ibmcloud.com/vulnerabilities/176437>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2020-8492](<https://vulners.com/cve/CVE-2020-8492>) \n**DESCRIPTION: **Python is vulnerable to a denial of service, caused by a flaw in the urllib.request.AbstractBasicAuthHandler. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a Regular Expression Denial of Service (ReDoS). \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/175462](<https://exchange.xforce.ibmcloud.com/vulnerabilities/175462>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2020-27619](<https://vulners.com/cve/CVE-2020-27619>) \n**DESCRIPTION: **An unspecified error with CJK codec tests call eval() on content retrieved throug HTTP in multibytecodec_support.py in Python has an unknown impact and attack vector. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/190408](<https://exchange.xforce.ibmcloud.com/vulnerabilities/190408>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) \n \n**CVEID: **[CVE-2021-23240](<https://vulners.com/cve/CVE-2021-23240>) \n**DESCRIPTION: **sudo could allow a local authenticated attacker to launch a symlink attack. The selinux_edit_copy_tfiles() and selinux_edit_create_tfiles functions creates temporary files insecurely. An attacker could exploit this vulnerability by creating a symbolic link from a temporary file to various files on the system, which could allow the attacker to overwrite arbitrary files on the system with elevated privileges. \nCVSS Base score: 5.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/194530](<https://exchange.xforce.ibmcloud.com/vulnerabilities/194530>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) \n \n**CVEID: **[CVE-2019-3842](<https://vulners.com/cve/CVE-2019-3842>) \n**DESCRIPTION: **systemd could allow a local authenticated attacker to gain elevated privileges on the system, caused by the failure to properly sanitize the environment before using the XDG_SEAT variable by pam_systemd. By spoofing an active session to PolicyKit, an authenticated attacker could exploit this vulnerability to gain additional PolicyKit privileges. \nCVSS Base score: 4.5 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/159257](<https://exchange.xforce.ibmcloud.com/vulnerabilities/159257>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L) \n \n**CVEID: **[CVE-2018-1000858](<https://vulners.com/cve/CVE-2018-1000858>) \n**DESCRIPTION: **GnuPG is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input by dirmngr. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities. \nCVSS Base score: 4.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/154528](<https://exchange.xforce.ibmcloud.com/vulnerabilities/154528>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N) \n \n**CVEID: **[CVE-2020-11080](<https://vulners.com/cve/CVE-2020-11080>) \n**DESCRIPTION: **Node.js is vulnerable to a denial of service, caused by an error in the HTTP/2 session frame which is limited to 32 settings by default. By sending overly large HTTP/2 SETTINGS frames, an attacker could exploit this vulnerability to consume all available CPU resources. \nCVSS Base score: 3.7 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/182815](<https://exchange.xforce.ibmcloud.com/vulnerabilities/182815>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2018-20843](<https://vulners.com/cve/CVE-2018-20843>) \n**DESCRIPTION: **libexpat is vulnerable to a denial of service, caused by an error in the XML parser. By persuading a victim to open a specially-crafted file, a remote attacker could exploit this vulnerability to consume all available CPU resources. \nCVSS Base score: 3.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/163073](<https://exchange.xforce.ibmcloud.com/vulnerabilities/163073>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2019-13012](<https://vulners.com/cve/CVE-2019-13012>) \n**DESCRIPTION: **GNOME GLib could allow a local attacker to bypass security restrictions, caused by improper permission control in the keyfile settings backend. An attacker could exploit this vulnerability to bypass access restrictions. \nCVSS Base score: 3.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/166666](<https://exchange.xforce.ibmcloud.com/vulnerabilities/166666>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) \n \n**CVEID: **[CVE-2019-19221](<https://vulners.com/cve/CVE-2019-19221>) \n**DESCRIPTION: **libarchive is vulnerable to a denial of service, caused by an out-of-bounds read in the archive_wstring_append_from_mbs in archive_string.c. By persuading a victim to open a specially-crafted file, a remote attacker could exploit this vulnerability to cause a denial of service condition. \nCVSS Base score: 3.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/172119](<https://exchange.xforce.ibmcloud.com/vulnerabilities/172119>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2019-2708](<https://vulners.com/cve/CVE-2019-2708>) \n**DESCRIPTION: **An unspecified vulnerability in Oracle Berkeley DB related to the Data Store component could allow an authenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors. \nCVSS Base score: 3.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/159800](<https://exchange.xforce.ibmcloud.com/vulnerabilities/159800>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2019-19956](<https://vulners.com/cve/CVE-2019-19956>) \n**DESCRIPTION: **libxml2 is vulnerable to a denial of service, caused by a memory leak in xmlParseBalancedChunkMemoryRecover in parser.c. By persuading a victim to open a specially crafted file, a remote attacker could exploit this vulnerability to cause the application to crash. \nCVSS Base score: 3.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/173518](<https://exchange.xforce.ibmcloud.com/vulnerabilities/173518>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L) \n \n**CVEID: **[CVE-2019-20388](<https://vulners.com/cve/CVE-2019-20388>) \n**DESCRIPTION: **GNOME libxml2 could allow a remote attacker to obtain sensitive information, caused by a xmlSchemaValidateStream memory leak in xmlSchemaPreRun in xmlschemas.c. By persuading a victim to open a specially crafted file, an attacker could exploit this vulnerability to obtain sensitive information. \nCVSS Base score: 3.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/175539](<https://exchange.xforce.ibmcloud.com/vulnerabilities/175539>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N) \n \n**CVEID: **[CVE-2021-23239](<https://vulners.com/cve/CVE-2021-23239>) \n**DESCRIPTION: **sudo could allow a local authenticated attacker to obtain sensitive information, caused by a race condition in sudoedit. By using symlink attack techniques, an attacker could exploit this vulnerability to obtain directory information, and use this information to launch further attacks against the affected system. \nCVSS Base score: 3.3 \nCVSS Temporal Score: See: [ https://exchange.xforce.ibmcloud.com/vulnerabilities/194529](<https://exchange.xforce.ibmcloud.com/vulnerabilities/194529>) for the current score. \nCVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)\n\n## Affected Products and Versions\n\nIBM QRadar SIEM 7.3.0 to 7.3.3 Fix Pack 9\n\nIBM QRadar SIEM 7.4.0 to 7.4.3 Fix Pack 2\n\n## Remediation/Fixes\n\n[QRadar / QRM / QVM / QRIF / QNI 7.3.3 Fix Pack 10](<https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=IBM%20Security&product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=7.4.0&platform=Linux&function=fixId&fixids=7.3.3-QRADAR-QRSIEM-20211125190208&includeRequisites=1&includeSupersedes=0&downloadMethod=http&source=SAR> \"\" )\n\nQRadar / QRM / QVM / QRIF / QNI 7.4.3 Fix Pack 3\n\n[QRadar / QRM / QVM / QRIF / QNI 7.4.3 Fix Pack 4](<https://www.ibm.com/support/fixcentral/swg/downloadFixes?parent=IBM%20Security&product=ibm/Other+software/IBM+Security+QRadar+SIEM&release=7.4.0&platform=Linux&function=fixId&fixids=7.4.3-QRADAR-QRSIEM-20211113154131&includeRequisites=1&includeSupersedes=0&downloadMethod=http> \"\" )\n\n**Note**: Version 7.4.3 Fix Pack 3 is only available to QRadar on Cloud users. QRadar 7.4.3 Fix Pack 3 [was removed for on-premise QRadar SIEM users](<https://www.ibm.com/support/pages/node/6509562>).\n\n## Workarounds and Mitigations\n\nNone\n\n## ", "published": "2021-12-03T18:52:37", "modified": "2021-12-03T18:52:37", "epss": [{"cve": "CVE-2016-10228", "epss": 0.00666, "percentile": 0.76838, "modified": "2023-06-19"}, {"cve": "CVE-2017-14502", "epss": 0.00675, "percentile": 0.77005, "modified": "2023-06-23"}, {"cve": "CVE-2018-1000858", "epss": 0.00244, "percentile": 0.61062, "modified": "2023-06-07"}, {"cve": "CVE-2018-20843", "epss": 0.91481, "percentile": 0.98418, "modified": "2023-06-23"}, {"cve": "CVE-2019-13012", "epss": 0.00434, "percentile": 0.71018, "modified": "2023-06-13"}, {"cve": "CVE-2019-13050", "epss": 0.00577, "percentile": 0.74929, "modified": "2023-06-13"}, {"cve": "CVE-2019-13627", "epss": 0.0019, "percentile": 0.55163, "modified": "2023-06-13"}, {"cve": "CVE-2019-14866", "epss": 0.00053, "percentile": 0.19025, "modified": "2023-06-13"}, {"cve": "CVE-2019-14889", "epss": 0.0069, "percentile": 0.77303, "modified": "2023-06-13"}, {"cve": "CVE-2019-15903", "epss": 0.00365, "percentile": 0.68448, "modified": "2023-06-13"}, {"cve": "CVE-2019-16935", "epss": 0.00271, "percentile": 0.63181, "modified": "2023-06-13"}, {"cve": "CVE-2019-18276", "epss": 0.00102, "percentile": 0.40526, "modified": "2023-06-13"}, {"cve": "CVE-2019-19221", "epss": 0.00076, "percentile": 0.30848, "modified": "2023-06-13"}, {"cve": "CVE-2019-19906", "epss": 0.00196, "percentile": 0.56162, "modified": "2023-06-13"}, {"cve": "CVE-2019-19956", "epss": 0.00548, "percentile": 0.74211, "modified": "2023-06-13"}, {"cve": "CVE-2019-20387", "epss": 0.00159, "percentile": 0.5131, "modified": "2023-06-13"}, {"cve": "CVE-2019-20388", "epss": 0.01001, "percentile": 0.81459, "modified": "2023-06-13"}, {"cve": "CVE-2019-20454", "epss": 0.00261, "percentile": 0.6251, "modified": "2023-06-13"}, {"cve": "CVE-2019-20907", "epss": 0.00565, "percentile": 0.74607, "modified": "2023-06-13"}, {"cve": "CVE-2019-20916", "epss": 0.0022, "percentile": 0.58696, "modified": "2023-06-13"}, {"cve": "CVE-2019-25013", "epss": 0.00311, "percentile": 0.6576, "modified": "2023-06-13"}, {"cve": "CVE-2019-2708", "epss": 0.00091, "percentile": 0.37829, "modified": "2023-06-13"}, {"cve": "CVE-2019-3842", "epss": 0.00156, "percentile": 0.50787, "modified": "2023-06-13"}, {"cve": "CVE-2019-9169", "epss": 0.0029, "percentile": 0.64555, "modified": "2023-06-13"}, {"cve": "CVE-2020-11080", "epss": 0.00788, "percentile": 0.79003, "modified": "2023-06-06"}, {"cve": "CVE-2020-13434", "epss": 0.00063, "percentile": 0.25071, "modified": "2023-06-06"}, {"cve": "CVE-2020-13543", "epss": 0.01339, "percentile": 0.84143, "modified": "2023-06-06"}, {"cve": "CVE-2020-13584", "epss": 0.00789, "percentile": 0.79093, "modified": "2023-06-06"}, {"cve": "CVE-2020-13776", "epss": 0.00044, "percentile": 0.10297, "modified": "2023-06-06"}, {"cve": "CVE-2020-13777", "epss": 0.00307, "percentile": 0.6553, "modified": "2023-06-06"}, {"cve": "CVE-2020-14352", "epss": 0.00179, "percentile": 0.53749, "modified": "2023-06-06"}, {"cve": "CVE-2020-14422", "epss": 0.01204, "percentile": 0.83248, "modified": "2023-06-06"}, {"cve": "CVE-2020-15358", "epss": 0.00078, "percentile": 0.32289, "modified": "2023-06-06"}, {"cve": "CVE-2020-1730", "epss": 0.00345, "percentile": 0.6747, "modified": "2023-06-06"}, {"cve": "CVE-2020-24659", "epss": 0.00483, "percentile": 0.72432, "modified": "2023-06-06"}, {"cve": "CVE-2020-24977", "epss": 0.00257, "percentile": 0.62116, "modified": "2023-06-06"}, {"cve": "CVE-2020-26116", "epss": 0.00247, "percentile": 0.61233, "modified": "2023-06-06"}, {"cve": "CVE-2020-27618", "epss": 0.00053, "percentile": 0.18798, "modified": "2023-06-06"}, {"cve": "CVE-2020-27619", "epss": 0.00639, "percentile": 0.76212, "modified": "2023-06-06"}, {"cve": "CVE-2020-28196", "epss": 0.00375, "percentile": 0.68812, "modified": "2023-06-06"}, {"cve": "CVE-2020-29361", "epss": 0.00358, "percentile": 0.68068, "modified": "2023-06-06"}, {"cve": "CVE-2020-29362", "epss": 0.00091, "percentile": 0.37872, "modified": "2023-06-06"}, {"cve": "CVE-2020-29363", "epss": 0.00098, "percentile": 0.39575, "modified": "2023-06-06"}, {"cve": "CVE-2020-7595", "epss": 0.00484, "percentile": 0.72484, "modified": "2023-06-06"}, {"cve": "CVE-2020-8177", "epss": 0.00099, "percentile": 0.39834, "modified": "2023-06-06"}, {"cve": "CVE-2020-8231", "epss": 0.00197, "percentile": 0.56191, "modified": "2023-06-06"}, {"cve": "CVE-2020-8284", "epss": 0.00148, "percentile": 0.49635, "modified": "2023-06-06"}, {"cve": "CVE-2020-8285", "epss": 0.0045, "percentile": 0.71446, "modified": "2023-06-06"}, {"cve": "CVE-2020-8286", "epss": 0.0026, "percentile": 0.62359, "modified": "2023-06-06"}, {"cve": "CVE-2020-8492", "epss": 0.00273, "percentile": 0.63323, "modified": "2023-06-06"}, {"cve": "CVE-2020-8927", "epss": 0.00282, "percentile": 0.639, "modified": "2023-06-06"}, {"cve": "CVE-2020-9948", "epss": 0.00157, "percentile": 0.50954, "modified": "2023-06-06"}, {"cve": "CVE-2020-9951", "epss": 0.00391, "percentile": 0.69481, "modified": "2023-06-06"}, {"cve": "CVE-2020-9983", "epss": 0.00493, "percentile": 0.72725, "modified": "2023-06-06"}, {"cve": "CVE-2021-20271", "epss": 0.00172, "percentile": 0.53006, "modified": "2023-05-27"}, {"cve": "CVE-2021-20305", "epss": 0.00415, "percentile": 0.703, "modified": "2023-05-27"}, {"cve": "CVE-2021-23239", "epss": 0.00051, "percentile": 0.1793, "modified": "2023-05-27"}, {"cve": "CVE-2021-23240", "epss": 0.00075, "percentile": 0.30543, "modified": "2023-05-27"}, {"cve": "CVE-2021-23336", "epss": 0.00149, "percentile": 0.49678, "modified": "2023-05-27"}, {"cve": "CVE-2021-3326", "epss": 0.00389, "percentile": 0.69336, "modified": "2023-05-23"}, {"cve": "CVE-2021-33503", "epss": 0.00221, "percentile": 0.58883, "modified": "2023-05-23"}, {"cve": "CVE-2021-3449", "epss": 0.00292, "percentile": 0.64564, "modified": "2023-05-23"}, {"cve": "CVE-2021-3450", "epss": 0.00198, "percentile": 0.5624, "modified": "2023-05-23"}, {"cve": "CVE-2021-3516", "epss": 0.00089, "percentile": 0.36603, "modified": "2023-05-23"}, {"cve": "CVE-2021-3520", "epss": 0.00122, "percentile": 0.45178, "modified": "2023-05-23"}, {"cve": "CVE-2021-3541", "epss": 0.00081, "percentile": 0.33288, "modified": "2023-05-23"}], "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "baseScore": 9.3}, "severity": "HIGH", "exploitabilityScore": 8.6, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, "href": "https://www.ibm.com/support/pages/node/6520474", "reporter": "IBM", "references": [], "cvelist": ["CVE-2016-10228", "CVE-2017-14502", "CVE-2018-1000858", "CVE-2018-20843", "CVE-2019-13012", "CVE-2019-13050", "CVE-2019-13627", "CVE-2019-14866", "CVE-2019-14889", "CVE-2019-15903", "CVE-2019-16935", "CVE-2019-18276", "CVE-2019-19221", "CVE-2019-19906", "CVE-2019-19956", "CVE-2019-20387", "CVE-2019-20388", "CVE-2019-20454", "CVE-2019-20907", "CVE-2019-20916", "CVE-2019-25013", "CVE-2019-2708", "CVE-2019-3842", "CVE-2019-9169", "CVE-2020-11080", "CVE-2020-13434", "CVE-2020-13543", "CVE-2020-13584", "CVE-2020-13776", "CVE-2020-13777", "CVE-2020-14352", "CVE-2020-14422", "CVE-2020-15358", "CVE-2020-1730", "CVE-2020-24659", "CVE-2020-24977", "CVE-2020-26116", "CVE-2020-27618", "CVE-2020-27619", "CVE-2020-28196", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-7595", "CVE-2020-8177", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8492", "CVE-2020-8927", "CVE-2020-9948", "CVE-2020-9951", "CVE-2020-9983", "CVE-2021-20271", "CVE-2021-20305", "CVE-2021-23239", "CVE-2021-23240", "CVE-2021-23336", "CVE-2021-3326", "CVE-2021-33503", "CVE-2021-3449", "CVE-2021-3450", "CVE-2021-3516", "CVE-2021-3520", "CVE-2021-3541"], "immutableFields": [], "lastseen": "2023-06-24T06:13:12", "viewCount": 22, "enchantments": {"score": {"value": 10.2, "vector": "NONE"}, "dependencies": {"references": [{"type": "aix", "idList": ["RPM_ADVISORY.ASC"]}, {"type": "almalinux", "idList": ["ALSA-2020:2755", "ALSA-2020:2848", "ALSA-2020:2852", "ALSA-2020:3662", "ALSA-2020:4432", "ALSA-2020:4433", "ALSA-2020:4443", "ALSA-2020:4479", "ALSA-2020:4482", "ALSA-2020:4484", "ALSA-2020:4490", "ALSA-2020:4497", "ALSA-2020:4508", "ALSA-2020:4539", "ALSA-2020:4545", "ALSA-2020:4641", "ALSA-2020:4654", "ALSA-2020:4846", "ALSA-2020:5483", "ALSA-2021:1024", "ALSA-2021:1206", "ALSA-2021:1581", "ALSA-2021:1582", "ALSA-2021:1585", "ALSA-2021:1586", "ALSA-2021:1593", "ALSA-2021:1597", "ALSA-2021:1609", "ALSA-2021:1610", "ALSA-2021:1611", "ALSA-2021:1633", "ALSA-2021:1675", "ALSA-2021:1702", "ALSA-2021:1723", "ALSA-2021:1761", "ALSA-2021:1879", "ALSA-2021:1968", "ALSA-2021:2569", "ALSA-2021:2574", "ALSA-2021:2575", "ALSA-2021:4151", "ALSA-2021:4160", "ALSA-2021:4162", "ALSA-2022:0827", "ALSA-2022:0830"]}, {"type": "alpinelinux", "idList": ["ALPINE:CVE-2017-14502", "ALPINE:CVE-2018-20843", "ALPINE:CVE-2019-13627", "ALPINE:CVE-2019-14866", "ALPINE:CVE-2019-14889", "ALPINE:CVE-2019-15903", "ALPINE:CVE-2019-16935", "ALPINE:CVE-2019-19906", "ALPINE:CVE-2019-19956", "ALPINE:CVE-2019-20388", "ALPINE:CVE-2019-20907", "ALPINE:CVE-2020-11080", "ALPINE:CVE-2020-13434", "ALPINE:CVE-2020-13543", "ALPINE:CVE-2020-13584", "ALPINE:CVE-2020-13777", "ALPINE:CVE-2020-14422", "ALPINE:CVE-2020-15358", "ALPINE:CVE-2020-1730", "ALPINE:CVE-2020-24977", "ALPINE:CVE-2020-26137", "ALPINE:CVE-2020-28196", "ALPINE:CVE-2020-29361", "ALPINE:CVE-2020-29362", "ALPINE:CVE-2020-29363", "ALPINE:CVE-2020-7595", "ALPINE:CVE-2020-8177", "ALPINE:CVE-2020-8231", "ALPINE:CVE-2020-8284", "ALPINE:CVE-2020-8285", "ALPINE:CVE-2020-8286", "ALPINE:CVE-2020-8492", "ALPINE:CVE-2020-8927", "ALPINE:CVE-2020-9948", "ALPINE:CVE-2020-9951", "ALPINE:CVE-2020-9983", "ALPINE:CVE-2021-20271", "ALPINE:CVE-2021-20305", "ALPINE:CVE-2021-23239", "ALPINE:CVE-2021-23240", "ALPINE:CVE-2021-23336", "ALPINE:CVE-2021-3449", "ALPINE:CVE-2021-3450", "ALPINE:CVE-2021-3520", "ALPINE:CVE-2021-3541"]}, {"type": "altlinux", "idList": ["172377A713A918D5853CA3E9B24EFF85", "1DEA21E8CC43D5E2435AE7EB16DAC242", "1F3AAB35952A2DE84DF1020B980B875B", "2777060AF262CE012638411E1C9044B6", "2CAE1607583637377ADACAB2F5F899B0", "2CF8AF7D1A2D42287EAC2DE68AEEB18D", "33BC9B12459278B2E8AA2FCB5E629EE0", "3C4A6B67E0D9728ADB6025D4036C16C2", "43FC5C59347F790C2A18D6709398549E", "506C1AE9D5B9144EB0FE579718193DB1", "567F180E2656D2B15554048D9CEF1B09", "5FD0F9A6B4C1814BAA30A0259A968094", "641641390598455C6AFBD0BCE7A8D150", "69FCC7D3741E27576F8891899E5C3887", "7304FA6A92BBC9DC45DFC1846E5141EC", "909AD112600F4B7C9F7BE0EA6049CD74", "9B8FBA6662B95E41A8BCCB5F346C028E", "B6930C49B0A0C5BB69C0C4C0448CAFB9", "B7B3433AC1544A3E36FEFA1DBBAA6093", "B963C4355B69B74D78CF5D3D44CBA7EB", "BF346AAE391F0CD1097D4DB67686DC33", "D2AF5967FB772111657DCE1F8F05D5DA", "DF55E7D20B60553E66843B066D780C77", "DFB3531007B1DED7ABA1D6D9F40A6504", "DFBA4EF54C79890FFE224A6EF14372C8", "F4B6EAF6AAD9D382AF5DA2B758A6A61F", "FB997A95475F3587DB1521DCA42F2E08", "FEA7462C847C06E37C33273089EBED5D"]}, {"type": "amazon", "idList": ["ALAS-2020-1342", "ALAS-2020-1404", "ALAS-2020-1406", "ALAS-2020-1407", "ALAS-2020-1411", "ALAS-2020-1427", "ALAS-2020-1428", "ALAS-2020-1429", "ALAS-2020-1432", "ALAS-2020-1438", "ALAS-2020-1444", "ALAS-2020-1454", "ALAS-2020-1460", "ALAS-2021-1459", "ALAS-2021-1498", "ALAS-2021-1500", "ALAS-2021-1504", "ALAS-2021-1511", "ALAS-2021-1521", "ALAS-2022-1593", "ALAS-2023-1742", "ALAS-2023-1743", "ALAS2-2019-1376", "ALAS2-2020-1432", "ALAS2-2020-1445", "ALAS2-2020-1451", "ALAS2-2020-1471", "ALAS2-2020-1483", "ALAS2-2020-1484", "ALAS2-2020-1505", "ALAS2-2020-1513", "ALAS2-2020-1534", "ALAS2-2020-1568", "ALAS2-2021-1599", "ALAS2-2021-1601", "ALAS2-2021-1605", "ALAS2-2021-1615", "ALAS2-2021-1622", "ALAS2-2021-1629", "ALAS2-2021-1639", "ALAS2-2021-1640", "ALAS2-2021-1656", "ALAS2-2021-1662", "ALAS2-2021-1669", "ALAS2-2021-1670", "ALAS2-2021-1677", "ALAS2-2021-1688", "ALAS2-2021-1689", "ALAS2-2021-1693", "ALAS2-2022-1802", "ALAS2-2022-1845", "ALAS2-2022-1854"]}, {"type": "androidsecurity", "idList": ["ANDROID:2021-10-01"]}, {"type": "apple", "idList": ["APPLE:22E5661C993E7A1F50344055EDC625BA", "APPLE:2A32C0762786DF36357D645066CDC600", "APPLE:2C63B730F1D775BC1F496033AB4C1E50", "APPLE:39DFCF58466CAAB3F50DE93E2A885C72", "APPLE:3D7765FAAA5588336144E1B60D0B775E", "APPLE:47A6F4E1660238E39625B31A34F6CDF1", "APPLE:4CDA87B47F793E07ABCA7B9C9345521B", "APPLE:5A8CFDD70DD53A4CB492643428B2B78C", "APPLE:60BF7F72692F6CFF341525F7AC92F5EC", "APPLE:76759F30E38205B816379E57C5E5C4C3", "APPLE:7B414D7D6363796AB8F0EB89C5EEC383", "APPLE:914AF8F52D4AB5DC92631271089CEE87", "APPLE:9AAA600C4496E1F352EC9F07A8BDC39B", "APPLE:B42E67860AD9D9F5B9307A29A1189DF0", "APPLE:B61E4B61B5310615293FA7FAB3B993B7", "APPLE:BEA171F52CE1A41E31B39FE9FEF8FF60", "APPLE:BEC13883FC65A6FD008F312DB93C0A36", "APPLE:BF1622028DAB7FB7B0D91852357DB961", "APPLE:E9C90A2600A9DE3614B923070AEC31B1", "APPLE:F7DADB3E958148A6B63512580383CEA2", "APPLE:FE34E67588C6E371B47F8C80ED459F90", "APPLE:HT210785", "APPLE:HT210788", "APPLE:HT210789", "APPLE:HT210790", "APPLE:HT210793", "APPLE:HT210794", "APPLE:HT210795", "APPLE:HT211288", "APPLE:HT211289", "APPLE:HT211843", "APPLE:HT211844", "APPLE:HT211845", "APPLE:HT211847", "APPLE:HT211850", "APPLE:HT211931", "APPLE:HT211935", "APPLE:HT211952", "APPLE:HT212147"]}, {"type": "archlinux", "idList": ["ASA-201910-15", "ASA-201910-16", "ASA-201910-17", "ASA-201911-3", "ASA-202004-11", "ASA-202006-2", "ASA-202009-12", "ASA-202009-13", "ASA-202011-15", "ASA-202011-28", "ASA-202101-25", "ASA-202102-16", "ASA-202102-17", "ASA-202102-28", "ASA-202102-37", "ASA-202103-10", "ASA-202103-27", "ASA-202105-27", "ASA-202106-25"]}, {"type": "attackerkb", "idList": ["AKB:0EF34EE1-74ED-42FF-A543-9543D3950C10", "AKB:93D7F9FF-1F51-45C7-8172-B3E45415E966", "AKB:98773293-D092-495A-AD61-3E5439225950"]}, {"type": "avleonov", "idList": ["AVLEONOV:317FBD7DA93C95993A9FFF38FB04A987"]}, {"type": "centos", "idList": ["CESA-2019:3193", "CESA-2019:3210", "CESA-2019:3756", "CESA-2020:3888", "CESA-2020:3908", "CESA-2020:3911", "CESA-2020:3952", "CESA-2020:3996", "CESA-2020:5002", "CESA-2020:5009", "CESA-2020:5010", "CESA-2020:5012", "CESA-2021:0348", "CESA-2021:1145", "CESA-2021:4785", "CESA-2022:5234", "CESA-2022:5235"]}, {"type": "checkpoint_security", "idList": ["CPS:SK172983"]}, {"type": "chrome", "idList": ["GCSA-2509954079155194578", "GCSA-7216160875710850344"]}, {"type": "cisco", "idList": ["CISCO-SA-OPENSSL-2021-GHY28DJD"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:033E22850A2C09F2DBD2349016F7E062", "CFOUNDRY:107C1172FB4EA8B3653E150709511216", "CFOUNDRY:12122B409153EB262420181E0E613DE3", "CFOUNDRY:136BE5151C3129DFE4B735524824187D", "CFOUNDRY:21B35C0D976E5B0E31872BF9E79110BB", "CFOUNDRY:30A00C196E388762A2434A745BE1363E", "CFOUNDRY:322886B40F0FE55C516FF12037103125", "CFOUNDRY:34D8A70C8A3E947B531EA7935997AA85", "CFOUNDRY:3720080273E86FF03D0F1B6427ACE3A9", "CFOUNDRY:372C89C2034124B41C6B1DC1B76A49D9", "CFOUNDRY:431A5FEB07A8E937BEDFD31D7F1BE817", "CFOUNDRY:482A184FE0A9A84338FFE0A421B192C1", "CFOUNDRY:4CA229089D29B1A5C8F47ED6A12CAC1D", "CFOUNDRY:5EA8EE4734BECA5E26F0C02B2E976F48", "CFOUNDRY:6212B057FC69171CB35A504A83DF4903", "CFOUNDRY:7CCE0B0CA4C32E297BEADD4E79F7EBE9", "CFOUNDRY:81709274A5535B1DACDD4242D3B162A5", "CFOUNDRY:853E5589D5EE11B72526D65C16FA38B8", "CFOUNDRY:89587F3ED65C323B89E14DDACE9BA27F", "CFOUNDRY:9118DFA7C915EC45BA2324EACC819ED6", "CFOUNDRY:A2488D03CBE987233F934844F44A3BB5", "CFOUNDRY:A8173D294B6DEC22BA8E4286E26D99DE", "CFOUNDRY:AEC4CB59C79AE6422739539A64DE92CC", "CFOUNDRY:D09A12445CD6214C067F9255280BC24D", "CFOUNDRY:D1800B931E71999DC3B721FFDBB42636", "CFOUNDRY:DC7BE5C08671B54CC5F39351987D8CA3", "CFOUNDRY:DF038CA686095997F28010C0D12B1C6A", "CFOUNDRY:E2EC45D69AA3550DE981BAC4E63015D3", "CFOUNDRY:E9CE0268DAFD76AE052E27B69A06ACBD", "CFOUNDRY:F06FFA2BD37C8D049603BACF49C5DBBE", "CFOUNDRY:F4A82A6B08C1BC8F71C40AB4FA993A57", "CFOUNDRY:FA8004154EABA0892471FE01E71BFD29", "CFOUNDRY:FAA30968EB5FC787D7DD15251E2F2C77", "CFOUNDRY:FABA7095744DBBE521F639A1D964B809"]}, {"type": "cloudlinux", "idList": ["CLSA-2020:1608724009", "CLSA-2021:1625650209", "CLSA-2021:1632401716", "CLSA-2021:1633442879", "CLSA-2021:1636389306", "CLSA-2021:1637583639", "CLSA-2021:1640697315", "CLSA-2022:1641903536", "CLSA-2022:1650908922", "CLSA-2022:1650910003"]}, {"type": "cnvd", "idList": ["CNVD-2022-06525"]}, {"type": "cve", "idList": ["CVE-2016-10228", "CVE-2017-14502", "CVE-2018-1000858", "CVE-2018-20843", "CVE-2019-13012", "CVE-2019-13050", "CVE-2019-13627", "CVE-2019-14866", "CVE-2019-14889", "CVE-2019-15903", "CVE-2019-16935", "CVE-2019-18276", "CVE-2019-19221", "CVE-2019-19906", "CVE-2019-19956", "CVE-2019-20387", "CVE-2019-20388", "CVE-2019-20454", "CVE-2019-20838", "CVE-2019-20907", "CVE-2019-20916", "CVE-2019-25013", "CVE-2019-2708", "CVE-2019-3842", "CVE-2019-9169", "CVE-2020-11080", "CVE-2020-13434", "CVE-2020-13543", "CVE-2020-13584", "CVE-2020-13776", "CVE-2020-13777", "CVE-2020-14352", "CVE-2020-14422", "CVE-2020-15358", "CVE-2020-1730", "CVE-2020-24659", "CVE-2020-24977", "CVE-2020-26116", "CVE-2020-26137", "CVE-2020-27618", "CVE-2020-27619", "CVE-2020-28196", "CVE-2020-28476", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-7595", "CVE-2020-8177", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8492", "CVE-2020-8927", "CVE-2020-9948", "CVE-2020-9951", "CVE-2020-9983", "CVE-2021-20271", "CVE-2021-20305", "CVE-2021-23239", "CVE-2021-23240", "CVE-2021-23336", "CVE-2021-28359", "CVE-2021-3326", "CVE-2021-33503", "CVE-2021-3449", "CVE-2021-3450", "CVE-2021-3516", "CVE-2021-3520", "CVE-2021-3541", "CVE-2021-40491"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1600-1:3AE4E", "DEBIAN:DLA-1600-1:DC924", "DEBIAN:DLA-1762-1:9B895", "DEBIAN:DLA-1762-1:ECF67", "DEBIAN:DLA-1839-1:13DB7", "DEBIAN:DLA-1839-1:728E0", "DEBIAN:DLA-1866-1:415BC", "DEBIAN:DLA-1866-1:D1352", "DEBIAN:DLA-1866-2:4F7E9", "DEBIAN:DLA-1866-2:95124", "DEBIAN:DLA-1912-1:C4001", "DEBIAN:DLA-1912-1:CAAA9", "DEBIAN:DLA-1931-1:24E75", "DEBIAN:DLA-1931-1:6D15F", "DEBIAN:DLA-1931-2:1F133", "DEBIAN:DLA-1931-2:63774", "DEBIAN:DLA-1981-1:9F57F", "DEBIAN:DLA-1987-1:28961", "DEBIAN:DLA-1987-1:E3D38", "DEBIAN:DLA-1997-1:9DD2C", "DEBIAN:DLA-1997-1:C6E62", "DEBIAN:DLA-2038-1:3A69F", "DEBIAN:DLA-2038-1:FD678", "DEBIAN:DLA-2044-1:26388", "DEBIAN:DLA-2044-1:3FF98", "DEBIAN:DLA-2048-1:4A4BD", "DEBIAN:DLA-2048-1:4AFA1", "DEBIAN:DLA-2088-1:945EA", "DEBIAN:DLA-2088-1:B1E4B", "DEBIAN:DLA-2221-1:3C6AD", "DEBIAN:DLA-2221-1:DCC99", "DEBIAN:DLA-2280-1:96280", "DEBIAN:DLA-2295-1:B6B51", "DEBIAN:DLA-2337-1:70801", "DEBIAN:DLA-2340-1:34DF9", "DEBIAN:DLA-2369-1:46D38", "DEBIAN:DLA-2369-1:E14AE", "DEBIAN:DLA-2370-1:AC2B8", "DEBIAN:DLA-2370-1:DF2B1", "DEBIAN:DLA-2382-1:05F3C", "DEBIAN:DLA-2437-1:334D0", "DEBIAN:DLA-2437-1:9852C", "DEBIAN:DLA-2456-1:D70B3", "DEBIAN:DLA-2476-1:BF3F0", "DEBIAN:DLA-2500-1:61422", "DEBIAN:DLA-2513-1:91B04", "DEBIAN:DLA-2569-1:11737", "DEBIAN:DLA-2569-1:E3354", "DEBIAN:DLA-2619-1:8192B", "DEBIAN:DLA-2628-1:6F808", "DEBIAN:DLA-2653-1:1DB39", "DEBIAN:DLA-2657-1:654CC", "DEBIAN:DLA-2657-1:9B21E", "DEBIAN:DLA-2669-1:F8CC1", "DEBIAN:DLA-2751-1:5F8DA", "DEBIAN:DLA-2760-1:AB0C9", "DEBIAN:DLA-2786-1:9D09D", "DEBIAN:DLA-2987-1:30B1F", "DEBIAN:DLA-3152-1:9B676", "DEBIAN:DLA-3164-1:A25EA", "DEBIAN:DLA-3181-1:C6C25", "DEBIAN:DLA-3202-1:F1E95", "DEBIAN:DLA-3205-1:40C3E", "DEBIAN:DSA-4360-1:DDB49", "DEBIAN:DSA-4428-1:20BBA", "DEBIAN:DSA-4428-1:9D170", "DEBIAN:DSA-4472-1:4A655", "DEBIAN:DSA-4472-1:97343", "DEBIAN:DSA-4530-1:44D76", "DEBIAN:DSA-4530-1:939B7", "DEBIAN:DSA-4549-1:796DA", "DEBIAN:DSA-4571-1:418C4", "DEBIAN:DSA-4591-1:41FDD", "DEBIAN:DSA-4591-1:7B449", "DEBIAN:DSA-4696-1:9504E", "DEBIAN:DSA-4697-1:3ECA8", "DEBIAN:DSA-4697-1:5D3B4", "DEBIAN:DSA-4795-1:5CD54", "DEBIAN:DSA-4797-1:1E569", "DEBIAN:DSA-4801-1:69ED7", "DEBIAN:DSA-4822-1:23BB8", "DEBIAN:DSA-4822-1:83743", "DEBIAN:DSA-4875-1:829EF", "DEBIAN:DSA-4875-1:AE1B0", "DEBIAN:DSA-4881-1:5FAC1", "DEBIAN:DSA-4919-1:44828", "DEBIAN:DSA-4919-1:5433F", "DEBIAN:DSA-4933-1:33C31", "DEBIAN:DSA-4933-1:B1877"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2016-10228", "DEBIANCVE:CVE-2017-14502", "DEBIANCVE:CVE-2018-1000858", "DEBIANCVE:CVE-2018-20843", "DEBIANCVE:CVE-2019-13012", "DEBIANCVE:CVE-2019-13627", "DEBIANCVE:CVE-2019-14866", "DEBIANCVE:CVE-2019-14889", "DEBIANCVE:CVE-2019-15903", "DEBIANCVE:CVE-2019-16935", "DEBIANCVE:CVE-2019-18276", "DEBIANCVE:CVE-2019-19221", "DEBIANCVE:CVE-2019-19906", "DEBIANCVE:CVE-2019-19956", "DEBIANCVE:CVE-2019-20387", "DEBIANCVE:CVE-2019-20388", "DEBIANCVE:CVE-2019-20454", "DEBIANCVE:CVE-2019-20838", "DEBIANCVE:CVE-2019-20907", "DEBIANCVE:CVE-2019-20916", "DEBIANCVE:CVE-2019-25013", "DEBIANCVE:CVE-2019-3842", "DEBIANCVE:CVE-2019-9169", "DEBIANCVE:CVE-2020-11080", "DEBIANCVE:CVE-2020-13434", "DEBIANCVE:CVE-2020-13543", "DEBIANCVE:CVE-2020-13584", "DEBIANCVE:CVE-2020-13776", "DEBIANCVE:CVE-2020-13777", "DEBIANCVE:CVE-2020-14422", "DEBIANCVE:CVE-2020-15358", "DEBIANCVE:CVE-2020-1730", "DEBIANCVE:CVE-2020-24659", "DEBIANCVE:CVE-2020-24977", "DEBIANCVE:CVE-2020-26116", "DEBIANCVE:CVE-2020-26137", "DEBIANCVE:CVE-2020-27618", "DEBIANCVE:CVE-2020-27619", "DEBIANCVE:CVE-2020-28196", "DEBIANCVE:CVE-2020-29361", "DEBIANCVE:CVE-2020-29362", "DEBIANCVE:CVE-2020-29363", "DEBIANCVE:CVE-2020-7595", "DEBIANCVE:CVE-2020-8177", "DEBIANCVE:CVE-2020-8231", "DEBIANCVE:CVE-2020-8284", "DEBIANCVE:CVE-2020-8285", "DEBIANCVE:CVE-2020-8286", "DEBIANCVE:CVE-2020-8492", "DEBIANCVE:CVE-2020-8927", "DEBIANCVE:CVE-2020-9948", "DEBIANCVE:CVE-2020-9951", "DEBIANCVE:CVE-2020-9983", "DEBIANCVE:CVE-2021-20271", "DEBIANCVE:CVE-2021-20305", "DEBIANCVE:CVE-2021-23239", "DEBIANCVE:CVE-2021-23240", "DEBIANCVE:CVE-2021-23336", "DEBIANCVE:CVE-2021-3326", "DEBIANCVE:CVE-2021-33503", "DEBIANCVE:CVE-2021-3449", "DEBIANCVE:CVE-2021-3450", "DEBIANCVE:CVE-2021-3516", "DEBIANCVE:CVE-2021-3520", "DEBIANCVE:CVE-2021-3541", "DEBIANCVE:CVE-2021-40491"]}, {"type": "exploitdb", "idList": ["EDB-ID:47726"]}, {"type": "exploitpack", "idList": ["EXPLOITPACK:4A2CD40AC1E4F7CF5E5B6AA1E21DA3BF"]}, {"type": "f5", "idList": ["F5:K04460334", "F5:K04572666", "F5:K05295469", "F5:K08641512", "F5:K08654551", "F5:K10396196", "F5:K15402727", "F5:K23456112", "F5:K30446705", "F5:K33101555", "F5:K34239812", "F5:K44945790", "F5:K51011533", "F5:K52171694", "F5:K52494142", "F5:K54823184", "F5:K61186963", "F5:K63525058", "F5:K68251873", "F5:K78284681", "F5:K86221000"]}, {"type": "fedora", "idList": ["FEDORA:00A0230BBF90", "FEDORA:0120731F2C7F", "FEDORA:04BF76309A15", "FEDORA:0560630A704A", "FEDORA:05C0C3052E9A", "FEDORA:067D430C2F61", "FEDORA:071096091F43", "FEDORA:072A630979BD", "FEDORA:1482A30A5265", "FEDORA:1523A318B2F7", "FEDORA:15D6F30B2676", "FEDORA:180E930E766E", "FEDORA:18A3D610D7C4", "FEDORA:1D191309D1B6", "FEDORA:1F4D830C7DBF", "FEDORA:210C430584A5", "FEDORA:21C3E309DE29", "FEDORA:22B613132075", "FEDORA:24541309E0C8", "FEDORA:248856062BF1", "FEDORA:27A3A30520EC", "FEDORA:282FE606E7CA", "FEDORA:2ACD760900BF", "FEDORA:2AD1A3185983", "FEDORA:2AEEA32A9DD3", "FEDORA:2B2C93094FB5", "FEDORA:2DF1B315B329", "FEDORA:2F13930DEAB1", "FEDORA:2FCE26076F64", "FEDORA:30D123099EC4", "FEDORA:3245830C47E2", "FEDORA:32F3D30A68A9", "FEDORA:3307C348B749", "FEDORA:33618309E3C6", "FEDORA:345C8607A30C", "FEDORA:36BF9305D418", "FEDORA:384B96390985", "FEDORA:38BA23112F3F", "FEDORA:3B93230A9BAA", "FEDORA:3B97F313413F", "FEDORA:3CA1930493B5", "FEDORA:404B730C2F75", "FEDORA:40A4630A526B", "FEDORA:43A58309CB98", "FEDORA:45F45348B754", "FEDORA:46373604814A", "FEDORA:49CA3304C366", "FEDORA:4A9773111B22", "FEDORA:4AAB530AA06D", "FEDORA:4BEAF309D338", "FEDORA:4CD41309CDAE", "FEDORA:4F60F30A106E", "FEDORA:5361730BB4C9", "FEDORA:55212604E121", "FEDORA:55FE8604DFF9", "FEDORA:57FF33092F97", "FEDORA:591B130E1979", "FEDORA:59A883072F03", "FEDORA:59DD6604B000", "FEDORA:5A09262C7A37", "FEDORA:5ABF46087C7C", "FEDORA:5BBC634DAC43", "FEDORA:5E9E662BAB1F", "FEDORA:61CEB60525CF", "FEDORA:62C7330A6A13", "FEDORA:62D1A60D12B5", "FEDORA:6492C3093DD7", "FEDORA:64C6630AD13C", "FEDORA:68780608A492", "FEDORA:6976D62A089B", "FEDORA:6C76E608E1F6", "FEDORA:6ED3730946F6", "FEDORA:706956148ECB", "FEDORA:71D65309D32B", "FEDORA:72A4E3093B5E", "FEDORA:73B0C3094225", "FEDORA:7412960648DB", "FEDORA:75CA430AA7A6", "FEDORA:75E8930BF358", "FEDORA:764143099EED", "FEDORA:7647A30B21FE", "FEDORA:764EE30C99A3", "FEDORA:771E031BBAB0", "FEDORA:79B8A317F545", "FEDORA:7A904309DE1B", "FEDORA:7DB0634EDA0C", "FEDORA:7FD9A309E3EF", "FEDORA:81544313EC94", "FEDORA:8275C3092F8B", "FEDORA:862A060321A8", "FEDORA:862DE30A5C4D", "FEDORA:8657A309BA6B", "FEDORA:87F6B31A3E94", "FEDORA:8D0BB60525B8", "FEDORA:91B92318754D", "FEDORA:91EBC309F493", "FEDORA:9408B30E7B01", "FEDORA:951236162FD6", "FEDORA:9848360648DC", "FEDORA:9BC6C307F973", "FEDORA:9F764605D68D", "FEDORA:A2CF8605771B", "FEDORA:A387A3072636", "FEDORA:A3DBF3099AE2", "FEDORA:A44B831211EA", "FEDORA:A7E596153F56", "FEDORA:A7EF93093F43", "FEDORA:A818330B264B", "FEDORA:A8BE83094DF0", "FEDORA:AA46430A6A34", "FEDORA:AA71A6383D9A", "FEDORA:AAF643072F13", "FEDORA:AC1C6304E3A3", "FEDORA:AC8B13099EFA", "FEDORA:AFBFD30A3E7C", "FEDORA:B42DC304E39B", "FEDORA:B5212306A249", "FEDORA:B5B17313A0D2", "FEDORA:B8C523106DFF", "FEDORA:B940C60A8A0C", "FEDORA:BB12030B266D", "FEDORA:BF65760525B8", "FEDORA:C0A2E30B00AE", "FEDORA:C1819309C5A0", "FEDORA:C381E30B2672", "FEDORA:C3ED760C452F", "FEDORA:C9F463090F26", "FEDORA:CD864304939A", "FEDORA:CFC09309E7A4", "FEDORA:D042530B067C", "FEDORA:D06633118C24", "FEDORA:D29C830C2A6B", "FEDORA:D36373112102", "FEDORA:D47CC30C448C", "FEDORA:D4A5430C7DB7", "FEDORA:D802930B2657", "FEDORA:DBC4662F3455", "FEDORA:DBE2B30A525F", "FEDORA:DBF7C3092516", "FEDORA:DC4F334EB5A4", "FEDORA:E29F2606E7E8", "FEDORA:E5FCA30FC672", "FEDORA:E79FC60FA1C8", "FEDORA:E910330B50BA", "FEDORA:E9B1430CC2C0", "FEDORA:EA4F2309E0EF", "FEDORA:EC30530A4CD0", "FEDORA:EC73D30DA8F7", "FEDORA:F0266309ACD0", "FEDORA:F0DF83075DC8", "FEDORA:F23FE31401E3"]}, {"type": "fortinet", "idList": ["FG-IR-22-008"]}, {"type": "freebsd", "idList": ["11FCFA8F-AC64-11EA-9DAB-000D3AB229D6", "1E7FA41B-F6CA-4FE8-BD46-0E176B42B14F", "2272E6F1-F029-11EA-838A-0011D823EEBD", "2CB21232-FB32-11EA-A929-A4BF014BF5F7", "33C05D57-BF6E-11EA-BA1E-0800273F78D3", "38A4A043-E937-11EB-9B84-D4C9EF517024", "3C77F139-3A09-11EB-929D-D4C9EF517024", "3D7DFD63-823B-11EA-B3A8-240A644DD835", "3FCB70A4-E22D-11EA-98B2-080027846A02", "4BB56D2F-A5B0-11EA-A860-08002728F74C", "524BD03A-BB75-11EB-BF35-080027F515EA", "56BA4513-A1BE-11EB-9072-D4C9EF517024", "5A668AB3-8D86-11EB-B8D6-D4C9EF517024", "6193B3F6-548C-11EB-BA01-206A8A720317", "6BFF5CA6-B61A-11EA-AEF4-08002728F74C", "9B7491FB-F253-11E9-A50C-000C29C4DC65", "A27B0BB6-84FC-11EA-B5B4-641C67A117D8", "A80C6273-988C-11EC-83AC-080027415D17", "B905DFF4-E227-11EA-B0EA-08002728F74C", "C0C1834C-9761-11EB-ACFD-0022489AD614", "C4AC9C79-AB37-11EA-8B5E-B42E99A1B9C3", "C7855866-C511-11EB-AE1D-B42E991FC52E", "C9C6C2F8-CD54-11E9-AF89-080027EF1A23", "E8483115-8B8E-11EA-BDCF-001B217B3468", "EF5B4F5F-A658-11EA-80D7-001CC0382B2F", "F59AF308-07F3-11EA-8C56-F8B156B6DCC8", "F5ABAFC0-FCF6-11EA-8758-E0D55E2A8BF9", "FDC49972-3CA7-11EB-929D-D4C9EF517024"]}, {"type": "freebsd_advisory", "idList": ["FREEBSD_ADVISORY:FREEBSD-SA-20:22.SQLITE", "FREEBSD_ADVISORY:FREEBSD-SA-21:07.OPENSSL"]}, {"type": "gentoo", "idList": ["GLSA-201908-11", "GLSA-201911-08", "GLSA-202003-27", "GLSA-202003-32", "GLSA-202004-08", "GLSA-202005-09", "GLSA-202006-01", "GLSA-202006-04", "GLSA-202006-16", "GLSA-202007-16", "GLSA-202007-26", "GLSA-202008-01", "GLSA-202009-01", "GLSA-202010-04", "GLSA-202011-17", "GLSA-202012-10", "GLSA-202012-14", "GLSA-202101-18", "GLSA-202101-20", "GLSA-202101-33", "GLSA-202103-03", "GLSA-202104-04", "GLSA-202105-31", "GLSA-202105-34", "GLSA-202107-05", "GLSA-202107-07", "GLSA-202107-36", "GLSA-202107-43"]}, {"type": "github", "idList": ["GHSA-3XXV-P78R-4FC6", "GHSA-5V8V-66V8-MWM7", "GHSA-7553-JR98-VX47", "GHSA-7RRM-V45F-JP64", "GHSA-83MX-573X-5RW9", "GHSA-8HFJ-XRJ2-PM22", "GHSA-9Q5J-JM53-V7VR", "GHSA-GPVV-69J7-GWJ8", "GHSA-Q2Q7-5PP4-W6PG", "GHSA-WQVQ-5M8C-6G24"]}, {"type": "githubexploit", "idList": ["050B5540-E4D4-523F-A821-852F4E2CCDD8", "1EC7B3F9-D744-509F-8197-DC2BD60AB45A", "8AF91308-D513-5EA4-9D47-1878D8F4E60C", "A48A7BCD-4B97-5BDB-A571-3B8DF0069FB9"]}, {"type": "gitlab", "idList": ["GITLAB-9796C073EC6F3F3F4D5B0825248D1BC8"]}, {"type": "hackerone", "idList": ["H1:1040166", "H1:1045844", "H1:1048457", "H1:1145454", "H1:1168205", "H1:676976", "H1:705420", "H1:887462", "H1:926638", "H1:948876"]}, {"type": "ibm", "idList": ["00DD5060E6124BE4F25A4AF7DA83D15A52360F89A1F6A84F1ED9C6E28CD62833", "02B60CDC8F4BAD8C01ABE804AE47C51EC8A4809D9204EC61478B6A825FBF607B", "0336508687FC75709AB1D96C0DF14CA61FD81A95284DDA31533A99A1CBFC2A81", "0840A51D28EF0DD64B280F3A27235139F2A35F67EC4956EB6F1E4CDD0C421ED5", "08C2C257946E62415EC25786F8C76FDCF0DF2699FFCA0379011E8DE3B9FE77A0", "0A425AE154320282FF38ABB3C8BA8D3AD10793B88A3CFCA031B295F986453B12", "0AC735C19116A7FB66D9921F93B7D9FF1E6BB4F1F2A9AF8B4AA371BC3E7211BE", "0B06DFE07E3434F430295CC71DF2D2D5405FDA3C1FC806C0F8B49507D84FD167", "0CEDAEEF56D336AB469D9AEFD2828A583188EF5EF5821C8E9E02492BC0EA3D0D", "0EB6AD2A7CDC25FBCDF358B0936A62DA85A4FB8E321049B009EEC9FAE83DF42F", "0EF2B3BEA4403B998499114AE5D3693C840E985B7ECCF95FA6F6834A4F819197", "0F5FDD6A95AE2FAC3D7E3C52034692C15DF4E5754EEFEF130DDA4280D97322F2", "0F94D25D257920B59E8541E40266908C5242591765186625C9D9426A6B0ED4BC", "132852B1DE77D59C44C9AA730E40BE78D2D1F5255171EBC25038563F548F07DC", "13CEF3E699B892EB8EDD7E52729E7EE991B647FA5B215D74BD789F18036E95A9", "156A423D91231641B7B06703B06D394BB31F565A2A6E565DA370AE1DFE2E3F38", "15DA8B02C0EE18C494CE300BE00470079DE5884E7FABD33120881C0071985E51", "17ADCC3991EF6418AEE30E045384B4AA787D40524B4DDCFDED54CEFB7330CCB1", "1A13E6CC79FCC83DDA9CC9D0EEC387490EEA3CB0B10BA19B2339B66E13D368F8", "1A8A5E6AC75FF4A1A546DD1431D4E3A224B13E96434DBC2C5C874D7E73D90553", "1B0ED4A3526A4957AFA5966EC1D954AC93826AA8F95F1EF2E8A3A6657E73F691", "1E239D8C4813C8FA705CBB86F01F323B29B73D1086FDF65021C9CB4B0146A272", "1F441006BD6862461E328CBE5798B150D2385A5EFC81BD71D8798DD87CFB31DD", "20E0B1B1DC6034FC35329433D466647C673F2AFB3543C7816DA076CF5AE5E952", "21BD6A763434CA1620B38210E0327CD6C4015E1CA7712C9CA8940EA7E95870CB", "22FE69B31A10A2D1A4C8753B638EBDDDA55E81977EC4563B990767DDEB64861F", "23E1A8234CB28A1958E6B0921DBFF41F837627FC7FE0AB52E91697295E3B8DA0", "2404E42A6AEF9D8505CDF5F29071088D46DB039426A35293F5767A7820D62316", "25397404A49A13F607BAB2C3AB213E098E878D383B3AD1E6FA8C841C89EA04A7", "26D5235D488CE1B4FF683176D66F75B4D6D0D1D2F64BBDA6EC8C9EAB70196A18", "29FEB4BC243AF3979A9988871B7F5C155C9D2A35DC7B74A7FF221E6D9E7BEA57", "2AFF257223AE58ADD9CEC49EDFE3A397C2BFAFEFD043CE43A15372A475968601", "2B9868CAD288C14AFDF0F5971D15B862C2D321ABB30241C9D87CD9C59FF9BD03", "2CBBC01EA20F67490CBAC1FBC54F752062CF74FF574C30707039FE42DBFD1C37", "2DB6C9FAA0CAC51EA8DC954A05A9A936B56C232A5503AE86749F4C0A4A99EA89", "2E58B569B4DB4763709C8CD7E2753A53378BB27D938664EE87B306305B546DAA", "2FCC7DC0304D890BD89CDF69CBC2061713764ECE208DAC4D9921CB090F26DD53", "30FC0C532542D6596B217061D3B9786ABE1AE5D6C6BE3856403D2A676557A8CD", "32A552C9D601D5556D9E77A4710C33359E9E59554828DF5DF32E88FA7D8B12FD", "3669E45D7FE2AA83192FF44FAA60FB349B5D39469F2B30F7D69463B2868B4908", "3751D59918B26EEDBAC0FEE1886D1A118A9D2105E993222B09C299A55F5D8424", "3768EF26D10A8D3D80E9253CA1E6D15061699940ABE247E2737191D372036914", "37B1C13D57560AD2D5EFC78D9765E406257D9DEC561AC751A89056CBB0B78CDF", "386787210638336CC8A4D4477798C39C1093AF9F1749D0FFC4352CD55B67EECC", "38CE21C8E36E0D8E13CFDB6726BF7297A06F5BEE727FDC02819987C18B1360E6", "3A0EC58D68A9FF044EFDD59A19016C7F96E811E1FC47D2E23F42FDF074B43F35", "3BA65632D2C38CB6B2155205BEF7E978F1A0061EDF59190756A9E0B8A31E73D6", "3C50E88D9CFDDC34C62AC2D294E34DB10B2E8CA0FB292CC2F6415273B71D2654", "3D00DF034C82CED588A736B67CB1795B83D89CAE2689402C82D5645CF4A3EF18", "3E1D02DCA860778FBE48F556210298F9AE84F328F20135DBEC6CA3A6CBA76374", "3F34AB5AA343AE750DDC18968E6F874BE99938ACC1A401B2E368156C6C827FD8", "40AB54AD406F2338CEDC99E69986ECDC190917A9D711E806EACC78563FDDE00D", "40FF55B5795EDDC89506253F7614F64D589E9F985162917C433828167306DB0E", "41E5114A4BDDC5721ED193477AF4D7766B975DA049CA337ACB35DD35514BD892", "45CF35DF98CCEBE555BB837DE6EA2F5A79C0540B83B3EEFAE129605E8565AE9E", "478179A4FF7D7F88209674CCCA14AA5E28599D1CB2F8DECF2A69F98F78B27118", "4A91EBA290B30504A8EF2EE87060FA1D3D5EF2F7A2869B4D9ACCE1C477DA4795", "4CE1B2F6454C1BD94457E47D668B97B231076132166B23B18741F946099CC719", "4E20FF6980EF77F8F7C53E254EBEB9AF129EF6EDA938A5BDE9CFA46C95393000", "50F054E398D9C2FEC6804DE8873031657002656851BE150871B2800BAA7C2644", "5199A793C798CC1219F9D1C2D8AF0421740FF6B8AB1DE24E6D06BDDE45EB6EE4", "532726FECC3B1D24D191D2502D19E229E8A42F481E2D82243939EB0E63D6C934", "568C1946F6948551373693B819E984491EDA4324124EB255F933921898311FAA", "56D5C4D9B33C1F45EC0E3A48B1E1AB84BC4291F8AFD78D9A30A0AC38C27FE216", "58D56C8D2689944BB7E42143A4197A4D5AE86937E35B03E954812116FCACD6C3", "5963E86102C13FAE4339A2BBD9EE6063D58E6EB52BC2AFE8F3A78D413258C3D1", "5B2548C6541B1859D763161398A2C0411503B1B1DF68AA7E25EE242BF792098C", "5B9FE3466C6709549936B7AF9F0C0D4DCFCB7C692D0EEFEE7E0A64D8C6798193", "5EEF86E68F23C5E3E4A700D875FD52D137A180161C92B0E0F8541AB754241C6D", "63617DA52BC3DA586C5288D29FCD365559DCCA7090AEDC93D422E80323F4ABEE", "63D9F729977C031A0651F7FF02871053A06F3575EB3AFAE0E78D3E2806A91736", "65479F953E54C21851BBC62A028F16F0946CF81404CEF80DF223E3A777553349", "6549F7FB91216E6B5325DB660AF73FDF2D181F5FC1D3D96D412B600D6C349A96", "65575758CE6E879BDCFD17ADB708B2448CDF9C00E078AEFB1967358BF519C078", "6592D9252E79D347E3A4FFDDFF016AB701763D108B8568C8DAE4D38C3A52C76A", "65EC64A753CE4A7F6C9FBB3047D29A2833F1E56F4AB452D779D8436BA19B01F0", "679BB8CE3220011CA4B10A26DAE28F57C4AE0FFE11D6960AF99282DDBDCCCC87", "6A0CE211061F295D9D98B616DAAADA0A43895F1108ACB08AF6BC99BC646F2753", "6A618EAE42104251ED8BFD4A24087719BC5523571FCFED871C921517BEA0FE71", "6A8FB2890AF2EBFB497D7D6CCC198FF3FF0E22BD184AAB460E05F9B5E0B6A4DF", "6B9D154BCE10DADDC28B259A53CDE7ADF906DBCB05E8EF0696407EACF7A37CB7", "6CB4EF3A076E2190B30084083521AA008A1E2F799850D429F0737446D33988B3", "6DFE02E47206439339CF69003DED7C6A339BE8A9FDA6611EA300ACF64BDB9DD1", "6E31A8C1AFBD4E4787BA087679C17E5D58D404DE1F2C658616BE5ACD914617EA", "6F5E7455D08E55E4F9F3DFA8B8B618487EC9BFDDC4FCB87851672633689609AB", "700973DB1C0B5FBE751BA9F1B6AF32C7F25F98D790B93A9C9D2DE61EB734BD58", "72AD5D71FF571D991FCA51BDAC7D0D303109A868FA89340C6F8CD492F9F038E3", "7379F90289C2C7A342F16A37575837A2FA27EB95290E6923107C2F8F596E9C51", "751740DF28FFBD1398BAB1CCB7840AA26198399CFF5B4BB6AF39E177AA85089D", "7A6627FB30537F67774301CE66136CB8471DD887C6FDF4BC9824732D94F56B3F", "7A89BB55E5B049E80A4EDE8650050366D20EC49B897A44F7858ECD4C51F1A2F8", "7C01AFE6E64B43031575F0102FF010954F3B02AB92048869BDE2D0610503F56C", "7E0744D5936EDC5F018B0850D801B665D388060D6A81B986BC7AD81C9A78C0EE", "7E1CB2FDA212C7A8FC0CCD8803720285F00C1F62F3E2628C7217A85BFA5FFBC8", "7E48E83AB3B599D048D884D2F2A9C830676F7F8EE7EFC2B799BFE4618D5E9A2F", "7F00398218A14B586B1DC506C6E9B0ECCD74597091AC18AB461C91BAED21F406", "7F1B2D3B77713A37E286E4D21B18E6D3A92838938B4DC057B8C935F3DCB61BC8", "7FAB240CA346743774B3038B1CF28BBF2974EBCA7D39061F9FE7518890E9860D", "8204B6AAEB9CA480B2BABF218A0BA53A2F6756B72A886187C55CC06DAD85DF7A", "85A203AE5F731A8A23D151364A5CA4469848689E5B34009D9D63DA579273DAD0", "89EDB053A13178ECCE22E53127E4E3457976D1CD3AF94B502528C97684F15BB8", "8BE640858107A39CA751E53E50F67C29895AE5B1C95B3062882245A603D61516", "8CB93770328F2819DE92FFEB5767258BAD5A547F304198FB72E85CAB4E4E55B4", "8CD12EF78572A4084B09F1DEB451D5D52F854099E5B1A1A30714B96E6F38483F", "8DEC2654592D64F2D867281F416FD4DE6D6CB55A2CF9AFFE8204C63823A299A4", "8DFD7A13AB8158902F79F0D3D8257F88EE240917FAA110AB3884DFF0906C31AB", "8F36292DD2EC673F77E7D26F88D6129155EA165304B1A957E549DC327B6DCB50", "9015B3024053E33993F6C31216DAD607F6216CD5AC759977FCFEA2292D1A3F6D", "914B3D8A3C96750F83A07447B8B437FD19FA6D91185D7E4959ABEC5B8EC2CC0B", "9242F5F4636D9D5E6BC415C0976986849485D113A030592ECDEE1CCA74C74EE1", "93D982A39132D6971EA07E3AA657EC8948513467BCB8FA924C2C3CDB21B10B29", "9413B45266B0A1BF4C0F9EFBF289FB6AC5322C48A1E69D09833E6DA257C8CC77", "956982A3E052293F0151836446E11BFC653A802D63CD0248D1D89A3EE15C0636", "95F72A00E1A8D6C6435D5EA582DBD8F295F4C86F1D6773A4DD617BAD40C3247F", "97CF7C515357F1AFFF5BDC937895F029179A2F0A599F6865A2F4BA81F8C07371", "97D5F772EC68BDCD260FBB9DFB7A322AAAC657E9360305DF11F9C6A6A40D1B85", "9965F358745F1B9369329D43E539B15C66501A996D90730CFA17D0F06E7694FA", "9E63E9416444AA2DF1664209083F4A7A31363BE16B637E0BA27E1FF0733D991A", "A172A905B7D669EE99F386F8EB10EB55D87468FA7338613B6E1E0388A01AD35F", "A273211199ABFE8E6374620379500B699CCE441D29CD8CE718FEBEE56DB0341A", "A2C8E2CF672AC451E5F568D88ED15C956CC420B68B1A498D23EF4F2087430CE6", "A2E923A551C0F36BAC84848E053A3A93F2AC1141EB9D1739FE1D48A6684F5352", "A435141E9D6894F7CA102FDB03C29288BC56B476D91906B1B0E7FA8301E0D89A", "A5F646FF4C83A4B1D2C8B47FCAC3D208DF17454D859B9AB5DD63F0E74300162C", "A81396DECDA68734AC02CDD489676D70AC4315FD2313AA28922145D45A9672E0", "AB24944DBEBE38F0BC5C45F998163889F0AE20E03F8A7A1E3E7A7BAC40D872C2", "AB7E82CD356AAA55900FFB785ECCA647E2DE687F0BE610FBC448CF5A139EB4CF", "AF3DCEF33857640D009F5E4CC1E77257EE27735E8E56FFC80BBBD0582870B32B", "AF7356B6BD67349B71B5E77D3CB023E5FA24FC17924E9C28B99EC0C046B8E216", "B07BD39DB6ED988F94DCA3EC6732BC232F86A4BF8A5079780CB4F9286CE2A8CB", "B17F6EA32217517527CEC9840D03393C5EFC22D03E15D5F135A129A339DB07A0", "B2EB1B0A78976B31AE7FEB79078A0F8E1A1DC8FD8366FABA05AEA647813A50A2", "B37FB96EE4FA4B06328DA641D49120233F6F6FC031E87E5A21A71F34BB882B42", "B5602F26DC4051D2B7FBBC59B479568A8211EC5FB27EDA9A06EBDB0E88FC8F9A", "B62D8810A9F9CE7BA2083D51187066D68816FFD4EBF6BF909B47034366888437", "B6ACE3D847E39498CDB0CD42409824F88EDE55C08F2623254F9E52E1CFAE8526", "B74A3B00A34D8FDB4B8EEF99280CED566B09656A926E55692D07C56A91D80E06", "BC0916015C108037BE6EEE58D101EE5DE12F752A3F9BF433C3D352C6406B3C0E", "BCFE59AECDDB67845A4B618BFD6E41A20C550D57DD097AC67063BDCE4F60B5F5", "BEC896DB9F018B1BCEE2BF9A76C241561F1A1E19105EBD0BF2C340BF4BD503B2", "C54A64F51ED224A8F7D429251E9F0DA945B243265F5C96506C23B694951F2D16", "CA1E3EFC07D22B2DA86595362931D640F30F757529856481F669DB4619DAD922", "CC6DB3505939453FB542901C62C95B2A03B3815D8482DF559005310A267A606D", "D11A0C2CC15BB8D7B04868F2862A15D1963924B4812649E2D326C9951AF9DCE2", "D1F42AA8CB20DBF23F25294AF1D5952B14F11D54D59A127F5802F150505DD446", "D5EE91437C61DB828864546A9877E1F863FE9DDA2D0B0BA7C35A8B9BDD774A7D", "D71F903EC9EE20A4A8C2DCFB2E21D38954D4598BFB4CF4FB467C4DD0050F0624", "D860B85F49895E0D8CF0AC6A066F6902558B044E03F0320678E24399C41C6135", "DB8E4E659E64514548095D982131905FB3A6F5608C5916769B8820AA6A05133D", "DE68CB4CCDCDA81A4F8B50BF2AEFA505CBC436FEDDE86CC77D8CBEEABED5A579", "E13F75F869D571A85240331EB120F83974D98D63498ADF9BE18416B8ADD741BD", "E1C5E861A6D158C86885CB6838A7B1FCA55ABEA2FBC0185590EDB82BF0D81FA8", "E266F803E71C486543CF623D66DDFA40AA2C4AEB0C15F49A79A5600D3D37709B", "E31519D348570E13DE06D25841BA7BC7594CA5BDE694E6A45E50426352D26932", "E3E61FEC6748E382667628E6AFCF0AF78E2FE67C358A7BA0209EA2D273188EF7", "E437CE503208373777E43450B168FBC3F47811675CA792BE0D00E04433982026", "E455072BD221DBB8B1C58AAE10839300D4B2DB2A7147F02EDADB4E2016749D64", "E4B907FE5279D8C6CE8330CC79305C67649550BA06CF29D70ABB593E6074803D", "E4ECCFFCA9F84A8C26E146C7649A9981F3387569BFB70E2FA208F1E76D8E3C5B", "E9A8C23824FEB3CF54C07A25B19E265D1905F763E9CC29B4410E2EC85F28EE49", "EB6E1E695AEE7162D2063471B65FA8BB5ACD4AA8DF2DD6282D0CF96F2F2E5EF3", "EF38988A8ADFAFD600C0AFEBC1A1C334BFCA6536F9015788D929A5A8036B9536", "EFC1B556A22098087C19B5342F262C1D63356C91A618DD58A453DF339E10D8AD", "F0AFFAB5446BEF6A6B346CA7237A1583252E55B1EA002352E7DFDFFB5796363C", "F10F8D3E795F8FC960C9DE67D3C8A350C036905B85F3908BFE6956BF772DB36B", "F1239172E03209D2AACAF721206C0452EFC5D82A8E51665A4E7A18DFE799B6A2", "FABB94D4F22FE933341A4AC48321DD3E7433EB12024376434818EBEED312A6EB", "FB7038711CD94F0B05673694D518462987220E995A1955584279EB344BADB046", "FC8CA79FD2C6CBC557F053DC4CAF87FEB39E7073F9BC87B640242B449D46DEBD", "FD2209B7CB15638992B681C2106BFB54C56CAD087AEDD9B4249C0F8E7ADCB3D2", "FFEEC184B6E70C6210AE293D53A3A1B1504EA119812486B8160ACE05A643D9DD"]}, {"type": "ics", "idList": ["ICSA-21-103-08", "ICSA-21-159-10", "ICSA-21-336-06", "ICSA-21-336-08", "ICSA-22-069-09", "ICSA-22-090-02", "ICSA-22-104-05", "ICSA-23-166-10"]}, {"type": "kaspersky", "idList": ["KLA11588", "KLA11589", "KLA11590", "KLA11591", "KLA11623", "KLA11624", "KLA11714", "KLA12006", "KLA12007", "KLA12017", "KLA12311", "KLA12474"]}, {"type": "kitploit", "idList": ["KITPLOIT:2401425074991132396", "KITPLOIT:3974184594574360239"]}, {"type": "mageia", "idList": ["MGASA-2019-0030", "MGASA-2019-0108", "MGASA-2019-0256", "MGASA-2019-0274", "MGASA-2019-0315", "MGASA-2019-0316", "MGASA-2019-0318", "MGASA-2019-0321", "MGASA-2019-0326", "MGASA-2019-0402", "MGASA-2020-0011", "MGASA-2020-0020", "MGASA-2020-0101", "MGASA-2020-0117", "MGASA-2020-0127", "MGASA-2020-0171", "MGASA-2020-0256", "MGASA-2020-0268", "MGASA-2020-0271", "MGASA-2020-0282", "MGASA-2020-0305", "MGASA-2020-0343", "MGASA-2020-0379", "MGASA-2020-0385", "MGASA-2020-0429", "MGASA-2020-0441", "MGASA-2020-0451", "MGASA-2020-0477", "MGASA-2020-0482", "MGASA-2021-0002", "MGASA-2021-0022", "MGASA-2021-0041", "MGASA-2021-0042", "MGASA-2021-0053", "MGASA-2021-0054", "MGASA-2021-0057", "MGASA-2021-0135", "MGASA-2021-0150", "MGASA-2021-0165", "MGASA-2021-0167", "MGASA-2021-0176", "MGASA-2021-0213", "MGASA-2021-0229", "MGASA-2021-0232", "MGASA-2021-0288", "MGASA-2021-0289", "MGASA-2021-0300", "MGASA-2021-0303", "MGASA-2021-0304", "MGASA-2021-0327", "MGASA-2021-0371", "MGASA-2021-0377", "MGASA-2022-0050"]}, {"type": "mozilla", "idList": ["MFSA2019-33", "MFSA2019-34", "MFSA2019-35"]}, {"type": "mscve", "idList": ["MS:CVE-2020-8927", "MS:CVE-2021-3449", "MS:CVE-2021-3450"]}, {"type": "nessus", "idList": ["AL2022_ALAS2022-2022-169.NASL", "AL2023_ALAS2023-2023-015.NASL", "AL2_ALAS-2019-1376.NASL", "AL2_ALAS-2020-1432.NASL", "AL2_ALAS-2020-1445.NASL", "AL2_ALAS-2020-1451.NASL", "AL2_ALAS-2020-1471.NASL", "AL2_ALAS-2020-1483.NASL", "AL2_ALAS-2020-1484.NASL", "AL2_ALAS-2020-1505.NASL", "AL2_ALAS-2020-1513.NASL", "AL2_ALAS-2020-1534.NASL", "AL2_ALAS-2020-1568.NASL", "AL2_ALAS-2021-1599.NASL", "AL2_ALAS-2021-1601.NASL", "AL2_ALAS-2021-1605.NASL", "AL2_ALAS-2021-1615.NASL", "AL2_ALAS-2021-1622.NASL", "AL2_ALAS-2021-1629.NASL", "AL2_ALAS-2021-1639.NASL", "AL2_ALAS-2021-1640.NASL", "AL2_ALAS-2021-1656.NASL", "AL2_ALAS-2021-1662.NASL", "AL2_ALAS-2021-1668.NASL", "AL2_ALAS-2021-1669.NASL", "AL2_ALAS-2021-1670.NASL", "AL2_ALAS-2021-1677.NASL", "AL2_ALAS-2021-1688.NASL", "AL2_ALAS-2021-1689.NASL", "AL2_ALAS-2021-1693.NASL", "AL2_ALAS-2022-1802.NASL", "AL2_ALAS-2022-1845.NASL", "AL2_ALAS-2022-1854.NASL", "ALA_ALAS-2020-1342.NASL", "ALA_ALAS-2020-1404.NASL", "ALA_ALAS-2020-1406.NASL", "ALA_ALAS-2020-1407.NASL", "ALA_ALAS-2020-1411.NASL", "ALA_ALAS-2020-1427.NASL", "ALA_ALAS-2020-1428.NASL", "ALA_ALAS-2020-1429.NASL", "ALA_ALAS-2020-1432.NASL", "ALA_ALAS-2020-1438.NASL", "ALA_ALAS-2020-1444.NASL", "ALA_ALAS-2020-1454.NASL", "ALA_ALAS-2020-1460.NASL", "ALA_ALAS-2021-1459.NASL", "ALA_ALAS-2021-1498.NASL", "ALA_ALAS-2021-1500.NASL", "ALA_ALAS-2021-1504.NASL", "ALA_ALAS-2021-1511.NASL", "ALA_ALAS-2021-1521.NASL", "ALA_ALAS-2022-1593.NASL", "ALA_ALAS-2023-1742.NASL", "ALA_ALAS-2023-1743.NASL", "ALMA_LINUX_ALSA-2020-2755.NASL", "ALMA_LINUX_ALSA-2020-4432.NASL", "ALMA_LINUX_ALSA-2020-4433.NASL", "ALMA_LINUX_ALSA-2020-4443.NASL", "ALMA_LINUX_ALSA-2020-4479.NASL", "ALMA_LINUX_ALSA-2020-4482.NASL", "ALMA_LINUX_ALSA-2020-4484.NASL", "ALMA_LINUX_ALSA-2020-4490.NASL", "ALMA_LINUX_ALSA-2020-4497.NASL", "ALMA_LINUX_ALSA-2020-4508.NASL", "ALMA_LINUX_ALSA-2020-4539.NASL", "ALMA_LINUX_ALSA-2020-4545.NASL", "ALMA_LINUX_ALSA-2020-4846.NASL", "ALMA_LINUX_ALSA-2020-5483.NASL", "ALMA_LINUX_ALSA-2021-1024.NASL", "ALMA_LINUX_ALSA-2021-1206.NASL", "ALMA_LINUX_ALSA-2021-1581.NASL", "ALMA_LINUX_ALSA-2021-1582.NASL", "ALMA_LINUX_ALSA-2021-1585.NASL", "ALMA_LINUX_ALSA-2021-1586.NASL", "ALMA_LINUX_ALSA-2021-1593.NASL", "ALMA_LINUX_ALSA-2021-1597.NASL", "ALMA_LINUX_ALSA-2021-1609.NASL", "ALMA_LINUX_ALSA-2021-1610.NASL", "ALMA_LINUX_ALSA-2021-1611.NASL", "ALMA_LINUX_ALSA-2021-1631.NASL", "ALMA_LINUX_ALSA-2021-1633.NASL", "ALMA_LINUX_ALSA-2021-1675.NASL", "ALMA_LINUX_ALSA-2021-1702.NASL", "ALMA_LINUX_ALSA-2021-1723.NASL", "ALMA_LINUX_ALSA-2021-1968.NASL", "ALMA_LINUX_ALSA-2021-2569.NASL", "ALMA_LINUX_ALSA-2021-2574.NASL", "ALMA_LINUX_ALSA-2021-2575.NASL", "ALMA_LINUX_ALSA-2021-4373.NASL", "APPLETV_13_3.NASL", "ARUBA_CLEARPASS_POLMAN_6_10_4.NASL", "CENTOS8_RHSA-2019-3196.NASL", "CENTOS8_RHSA-2019-3237.NASL", "CENTOS8_RHSA-2020-1605.NASL", "CENTOS8_RHSA-2020-2637.NASL", "CENTOS8_RHSA-2020-2755.NASL", "CENTOS8_RHSA-2020-2848.NASL", "CENTOS8_RHSA-2020-2852.NASL", "CENTOS8_RHSA-2020-3658.NASL", "CENTOS8_RHSA-2020-3662.NASL", "CENTOS8_RHSA-2020-4432.NASL", "CENTOS8_RHSA-2020-4433.NASL", "CENTOS8_RHSA-2020-4443.NASL", "CENTOS8_RHSA-2020-4479.NASL", "CENTOS8_RHSA-2020-4482.NASL", "CENTOS8_RHSA-2020-4484.NASL", "CENTOS8_RHSA-2020-4490.NASL", "CENTOS8_RHSA-2020-4497.NASL", "CENTOS8_RHSA-2020-4508.NASL", "CENTOS8_RHSA-2020-4539.NASL", "CENTOS8_RHSA-2020-4545.NASL", "CENTOS8_RHSA-2020-4599.NASL", "CENTOS8_RHSA-2020-4641.NASL", "CENTOS8_RHSA-2020-4654.NASL", "CENTOS8_RHSA-2020-4846.NASL", "CENTOS8_RHSA-2020-5483.NASL", "CENTOS8_RHSA-2021-1024.NASL", "CENTOS8_RHSA-2021-1206.NASL", "CENTOS8_RHSA-2021-1581.NASL", "CENTOS8_RHSA-2021-1582.NASL", "CENTOS8_RHSA-2021-1585.NASL", "CENTOS8_RHSA-2021-1586.NASL", "CENTOS8_RHSA-2021-1593.NASL", "CENTOS8_RHSA-2021-1597.NASL", "CENTOS8_RHSA-2021-1609.NASL", "CENTOS8_RHSA-2021-1610.NASL", "CENTOS8_RHSA-2021-1611.NASL", "CENTOS8_RHSA-2021-1633.NASL", "CENTOS8_RHSA-2021-1675.NASL", "CENTOS8_RHSA-2021-1679.NASL", "CENTOS8_RHSA-2021-1702.NASL", "CENTOS8_RHSA-2021-1723.NASL", "CENTOS8_RHSA-2021-1761.NASL", "CENTOS8_RHSA-2021-1879.NASL", "CENTOS8_RHSA-2021-1968.NASL", "CENTOS8_RHSA-2021-2569.NASL", "CENTOS8_RHSA-2021-2574.NASL", "CENTOS8_RHSA-2021-2575.NASL", "CENTOS8_RHSA-2021-4151.NASL", "CENTOS8_RHSA-2021-4160.NASL", "CENTOS8_RHSA-2021-4162.NASL", "CENTOS_RHSA-2019-3193.NASL", "CENTOS_RHSA-2019-3210.NASL", "CENTOS_RHSA-2019-3756.NASL", "CENTOS_RHSA-2020-3888.NASL", "CENTOS_RHSA-2020-3908.NASL", "CENTOS_RHSA-2020-3911.NASL", "CENTOS_RHSA-2020-3952.NASL", "CENTOS_RHSA-2020-3996.NASL", "CENTOS_RHSA-2020-5002.NASL", "CENTOS_RHSA-2020-5009.NASL", "CENTOS_RHSA-2020-5010.NASL", "CENTOS_RHSA-2020-5012.NASL", "CENTOS_RHSA-2021-0348.NASL", "CENTOS_RHSA-2021-1145.NASL", "CENTOS_RHSA-2021-4785.NASL", "CENTOS_RHSA-2022-5234.NASL", "CENTOS_RHSA-2022-5235.NASL", "DEBIAN_DLA-1600.NASL", "DEBIAN_DLA-1839.NASL", "DEBIAN_DLA-1866.NASL", "DEBIAN_DLA-1931.NASL", "DEBIAN_DLA-1981.NASL", "DEBIAN_DLA-1987.NASL", "DEBIAN_DLA-1997.NASL", "DEBIAN_DLA-2044.NASL", "DEBIAN_DLA-2048.NASL", "DEBIAN_DLA-2088.NASL", "DEBIAN_DLA-2221.NASL", "DEBIAN_DLA-2280.NASL", "DEBIAN_DLA-2295.NASL", "DEBIAN_DLA-2337.NASL", "DEBIAN_DLA-2369.NASL", "DEBIAN_DLA-2370.NASL", "DEBIAN_DLA-2382.NASL", "DEBIAN_DLA-2437.NASL", "DEBIAN_DLA-2456.NASL", "DEBIAN_DLA-2476.NASL", "DEBIAN_DLA-2500.NASL", "DEBIAN_DLA-2513.NASL", "DEBIAN_DLA-2569.NASL", "DEBIAN_DLA-2619.NASL", "DEBIAN_DLA-2628.NASL", "DEBIAN_DLA-2653.NASL", "DEBIAN_DLA-2657.NASL", "DEBIAN_DLA-2669.NASL", "DEBIAN_DLA-2751.NASL", "DEBIAN_DLA-2760.NASL", "DEBIAN_DLA-2786.NASL", "DEBIAN_DLA-2987.NASL", "DEBIAN_DLA-3152.NASL", "DEBIAN_DLA-3164.NASL", "DEBIAN_DLA-3181.NASL", "DEBIAN_DLA-3202.NASL", "DEBIAN_DLA-3205.NASL", "DEBIAN_DLA-3363.NASL", "DEBIAN_DLA-3424.NASL", "DEBIAN_DLA-3432.NASL", "DEBIAN_DLA-3437.NASL", "DEBIAN_DLA-3445.NASL", "DEBIAN_DSA-4360.NASL", "DEBIAN_DSA-4428.NASL", "DEBIAN_DSA-4472.NASL", "DEBIAN_DSA-4530.NASL", "DEBIAN_DSA-4549.NASL", "DEBIAN_DSA-4571.NASL", "DEBIAN_DSA-4591.NASL", "DEBIAN_DSA-4696.NASL", "DEBIAN_DSA-4697.NASL", "DEBIAN_DSA-4795.NASL", "DEBIAN_DSA-4797.NASL", "DEBIAN_DSA-4801.NASL", "DEBIAN_DSA-4822.NASL", "DEBIAN_DSA-4875.NASL", "DEBIAN_DSA-4881.NASL", "DEBIAN_DSA-4919.NASL", "DEBIAN_DSA-4933.NASL", "EULEROS_SA-2019-1111.NASL", "EULEROS_SA-2019-1135.NASL", "EULEROS_SA-2019-1260.NASL", "EULEROS_SA-2019-1344.NASL", "EULEROS_SA-2019-1552.NASL", "EULEROS_SA-2019-1599.NASL", "EULEROS_SA-2019-1648.NASL", "EULEROS_SA-2019-1661.NASL", "EULEROS_SA-2019-1703.NASL", "EULEROS_SA-2019-1758.NASL", "EULEROS_SA-2019-1783.NASL", "EULEROS_SA-2019-1808.NASL", "EULEROS_SA-2019-1841.NASL", "EULEROS_SA-2019-1894.NASL", "EULEROS_SA-2019-1923.NASL", "EULEROS_SA-2019-1927.NASL", "EULEROS_SA-2019-1935.NASL", "EULEROS_SA-2019-1973.NASL", "EULEROS_SA-2019-2014.NASL", "EULEROS_SA-2019-2030.NASL", "EULEROS_SA-2019-2063.NASL", "EULEROS_SA-2019-2077.NASL", "EULEROS_SA-2019-2103.NASL", "EULEROS_SA-2019-2107.NASL", "EULEROS_SA-2019-2114.NASL", "EULEROS_SA-2019-2115.NASL", "EULEROS_SA-2019-2145.NASL", "EULEROS_SA-2019-2225.NASL", "EULEROS_SA-2019-2256.NASL", "EULEROS_SA-2019-2349.NASL", "EULEROS_SA-2019-2379.NASL", "EULEROS_SA-2019-2433.NASL", "EULEROS_SA-2019-2442.NASL", "EULEROS_SA-2019-2653.NASL", "EULEROS_SA-2019-2687.NASL", "EULEROS_SA-2020-1002.NASL", "EULEROS_SA-2020-1044.NASL", "EULEROS_SA-2020-1048.NASL", "EULEROS_SA-2020-1056.NASL", "EULEROS_SA-2020-1075.NASL", "EULEROS_SA-2020-1085.NASL", "EULEROS_SA-2020-1117.NASL", "EULEROS_SA-2020-1140.NASL", "EULEROS_SA-2020-1145.NASL", "EULEROS_SA-2020-1153.NASL", "EULEROS_SA-2020-1159.NASL", "EULEROS_SA-2020-1164.NASL", "EULEROS_SA-2020-1165.NASL", "EULEROS_SA-2020-1212.NASL", "EULEROS_SA-2020-1217.NASL", "EULEROS_SA-2020-1226.NASL", "EULEROS_SA-2020-1275.NASL", "EULEROS_SA-2020-1295.NASL", "EULEROS_SA-2020-1296.NASL", "EULEROS_SA-2020-1303.NASL", "EULEROS_SA-2020-1310.NASL", "EULEROS_SA-2020-1321.NASL", "EULEROS_SA-2020-1332.NASL", "EULEROS_SA-2020-1336.NASL", "EULEROS_SA-2020-1343.NASL", "EULEROS_SA-2020-1344.NASL", "EULEROS_SA-2020-1346.NASL", "EULEROS_SA-2020-1358.NASL", "EULEROS_SA-2020-1362.NASL", "EULEROS_SA-2020-1375.NASL", "EULEROS_SA-2020-1377.NASL", "EULEROS_SA-2020-1387.NASL", "EULEROS_SA-2020-1405.NASL", "EULEROS_SA-2020-1408.NASL", "EULEROS_SA-2020-1427.NASL", "EULEROS_SA-2020-1434.NASL", "EULEROS_SA-2020-1445.NASL", "EULEROS_SA-2020-1456.NASL", "EULEROS_SA-2020-1472.NASL", "EULEROS_SA-2020-1474.NASL", "EULEROS_SA-2020-1488.NASL", "EULEROS_SA-2020-1509.NASL", "EULEROS_SA-2020-1510.NASL", "EULEROS_SA-2020-1516.NASL", "EULEROS_SA-2020-1522.NASL", "EULEROS_SA-2020-1533.NASL", "EULEROS_SA-2020-1560.NASL", "EULEROS_SA-2020-1569.NASL", "EULEROS_SA-2020-1607.NASL", "EULEROS_SA-2020-1630.NASL", "EULEROS_SA-2020-1631.NASL", "EULEROS_SA-2020-1646.NASL", "EULEROS_SA-2020-1654.NASL", "EULEROS_SA-2020-1670.NASL", "EULEROS_SA-2020-1699.NASL", "EULEROS_SA-2020-1702.NASL", "EULEROS_SA-2020-1716.NASL", "EULEROS_SA-2020-1737.NASL", "EULEROS_SA-2020-1768.NASL", "EULEROS_SA-2020-1779.NASL", "EULEROS_SA-2020-1796.NASL", "EULEROS_SA-2020-1803.NASL", "EULEROS_SA-2020-1815.NASL", "EULEROS_SA-2020-1822.NASL", "EULEROS_SA-2020-1823.NASL", "EULEROS_SA-2020-1827.NASL", "EULEROS_SA-2020-1842.NASL", "EULEROS_SA-2020-1899.NASL", "EULEROS_SA-2020-1900.NASL", "EULEROS_SA-2020-1902.NASL", "EULEROS_SA-2020-1907.NASL", "EULEROS_SA-2020-1908.NASL", "EULEROS_SA-2020-1911.NASL", "EULEROS_SA-2020-1930.NASL", "EULEROS_SA-2020-1935.NASL", "EULEROS_SA-2020-1951.NASL", "EULEROS_SA-2020-1961.NASL", "EULEROS_SA-2020-1987.NASL", "EULEROS_SA-2020-2031.NASL", "EULEROS_SA-2020-2059.NASL", "EULEROS_SA-2020-2061.NASL", "EULEROS_SA-2020-2081.NASL", "EULEROS_SA-2020-2095.NASL", "EULEROS_SA-2020-2101.NASL", "EULEROS_SA-2020-2154.NASL", "EULEROS_SA-2020-2163.NASL", "EULEROS_SA-2020-2168.NASL", "EULEROS_SA-2020-2173.NASL", "EULEROS_SA-2020-2178.NASL", "EULEROS_SA-2020-2216.NASL", "EULEROS_SA-2020-2218.NASL", "EULEROS_SA-2020-2228.NASL", "EULEROS_SA-2020-2231.NASL", "EULEROS_SA-2020-2264.NASL", "EULEROS_SA-2020-2265.NASL", "EULEROS_SA-2020-2279.NASL", "EULEROS_SA-2020-2281.NASL", "EULEROS_SA-2020-2289.NASL", "EULEROS_SA-2020-2310.NASL", "EULEROS_SA-2020-2317.NASL", "EULEROS_SA-2020-2318.NASL", "EULEROS_SA-2020-2319.NASL", "EULEROS_SA-2020-2328.NASL", "EULEROS_SA-2020-2337.NASL", "EULEROS_SA-2020-2354.NASL", "EULEROS_SA-2020-2366.NASL", "EULEROS_SA-2020-2388.NASL", "EULEROS_SA-2020-2398.NASL", "EULEROS_SA-2020-2413.NASL", "EULEROS_SA-2020-2419.NASL", "EULEROS_SA-2020-2420.NASL", "EULEROS_SA-2020-2431.NASL", "EULEROS_SA-2020-2437.NASL", "EULEROS_SA-2020-2438.NASL", "EULEROS_SA-2020-2453.NASL", "EULEROS_SA-2020-2456.NASL", "EULEROS_SA-2020-2471.NASL", "EULEROS_SA-2020-2472.NASL", "EULEROS_SA-2020-2480.NASL", "EULEROS_SA-2020-2489.NASL", "EULEROS_SA-2020-2490.NASL", "EULEROS_SA-2020-2502.NASL", "EULEROS_SA-2020-2503.NASL", "EULEROS_SA-2020-2508.NASL", "EULEROS_SA-2020-2527.NASL", "EULEROS_SA-2020-2528.NASL", "EULEROS_SA-2021-1003.NASL", "EULEROS_SA-2021-1010.NASL", "EULEROS_SA-2021-1015.NASL", "EULEROS_SA-2021-1022.NASL", "EULEROS_SA-2021-1029.NASL", "EULEROS_SA-2021-1034.NASL", "EULEROS_SA-2021-1047.NASL", "EULEROS_SA-2021-1063.NASL", "EULEROS_SA-2021-1080.NASL", "EULEROS_SA-2021-1093.NASL", "EULEROS_SA-2021-1105.NASL", "EULEROS_SA-2021-1114.NASL", "EULEROS_SA-2021-1115.NASL", "EULEROS_SA-2021-1137.NASL", "EULEROS_SA-2021-1142.NASL", "EULEROS_SA-2021-1149.NASL", "EULEROS_SA-2021-1150.NASL", "EULEROS_SA-2021-1161.NASL", "EULEROS_SA-2021-1173.NASL", "EULEROS_SA-2021-1174.NASL", "EULEROS_SA-2021-1226.NASL", "EULEROS_SA-2021-1257.NASL", "EULEROS_SA-2021-1258.NASL", "EULEROS_SA-2021-1276.NASL", "EULEROS_SA-2021-1277.NASL", "EULEROS_SA-2021-1287.NASL", "EULEROS_SA-2021-1299.NASL", "EULEROS_SA-2021-1312.NASL", "EULEROS_SA-2021-1340.NASL", "EULEROS_SA-2021-1350.NASL", "EULEROS_SA-2021-1375.NASL", "EULEROS_SA-2021-1382.NASL", "EULEROS_SA-2021-1390.NASL", "EULEROS_SA-2021-1397.NASL", "EULEROS_SA-2021-1399.NASL", "EULEROS_SA-2021-1403.NASL", "EULEROS_SA-2021-1410.NASL", "EULEROS_SA-2021-1412.NASL", "EULEROS_SA-2021-1414.NASL", "EULEROS_SA-2021-1415.NASL", "EULEROS_SA-2021-1419.NASL", "EULEROS_SA-2021-1424.NASL", "EULEROS_SA-2021-1449.NASL", "EULEROS_SA-2021-1466.NASL", "EULEROS_SA-2021-1468.NASL", "EULEROS_SA-2021-1477.NASL", "EULEROS_SA-2021-1487.NASL", "EULEROS_SA-2021-1495.NASL", "EULEROS_SA-2021-1507.NASL", "EULEROS_SA-2021-1512.NASL", "EULEROS_SA-2021-1520.NASL", "EULEROS_SA-2021-1534.NASL", "EULEROS_SA-2021-1537.NASL", "EULEROS_SA-2021-1543.NASL", "EULEROS_SA-2021-1544.NASL", "EULEROS_SA-2021-1548.NASL", "EULEROS_SA-2021-1553.NASL", "EULEROS_SA-2021-1555.NASL", "EULEROS_SA-2021-1560.NASL", "EULEROS_SA-2021-1568.NASL", "EULEROS_SA-2021-1569.NASL", "EULEROS_SA-2021-1572.NASL", "EULEROS_SA-2021-1574.NASL", "EULEROS_SA-2021-1575.NASL", "EULEROS_SA-2021-1582.NASL", "EULEROS_SA-2021-1596.NASL", "EULEROS_SA-2021-1605.NASL", "EULEROS_SA-2021-1607.NASL", "EULEROS_SA-2021-1610.NASL", "EULEROS_SA-2021-1620.NASL", "EULEROS_SA-2021-1623.NASL", "EULEROS_SA-2021-1624.NASL", "EULEROS_SA-2021-1626.NASL", "EULEROS_SA-2021-1636.NASL", "EULEROS_SA-2021-1641.NASL", "EULEROS_SA-2021-1645.NASL", "EULEROS_SA-2021-1648.NASL", "EULEROS_SA-2021-1649.NASL", "EULEROS_SA-2021-1655.NASL", "EULEROS_SA-2021-1661.NASL", "EULEROS_SA-2021-1665.NASL", "EULEROS_SA-2021-1672.NASL", "EULEROS_SA-2021-1676.NASL", "EULEROS_SA-2021-1685.NASL", "EULEROS_SA-2021-1697.NASL", "EULEROS_SA-2021-1707.NASL", "EULEROS_SA-2021-1711.NASL", "EULEROS_SA-2021-1713.NASL", "EULEROS_SA-2021-1722.NASL", "EULEROS_SA-2021-1724.NASL", "EULEROS_SA-2021-1726.NASL", "EULEROS_SA-2021-1737.NASL", "EULEROS_SA-2021-1738.NASL", "EULEROS_SA-2021-1747.NASL", "EULEROS_SA-2021-1750.NASL", "EULEROS_SA-2021-1757.NASL", "EULEROS_SA-2021-1790.NASL", "EULEROS_SA-2021-1835.NASL", "EULEROS_SA-2021-1868.NASL", "EULEROS_SA-2021-1872.NASL", "EULEROS_SA-2021-1886.NASL", "EULEROS_SA-2021-1899.NASL", "EULEROS_SA-2021-1911.NASL", "EULEROS_SA-2021-1921.NASL", "EULEROS_SA-2021-1925.NASL", "EULEROS_SA-2021-1936.NASL", "EULEROS_SA-2021-1942.NASL", "EULEROS_SA-2021-1946.NASL", "EULEROS_SA-2021-1957.NASL", "EULEROS_SA-2021-1960.NASL", "EULEROS_SA-2021-1970.NASL", "EULEROS_SA-2021-1985.NASL", "EULEROS_SA-2021-1992.NASL", "EULEROS_SA-2021-1997.NASL", "EULEROS_SA-2021-2000.NASL", "EULEROS_SA-2021-2007.NASL", "EULEROS_SA-2021-2015.NASL", "EULEROS_SA-2021-2020.NASL", "EULEROS_SA-2021-2022.NASL", "EULEROS_SA-2021-2028.NASL", "EULEROS_SA-2021-2034.NASL", "EULEROS_SA-2021-2052.NASL", "EULEROS_SA-2021-2063.NASL", "EULEROS_SA-2021-2076.NASL", "EULEROS_SA-2021-2081.NASL", "EULEROS_SA-2021-2096.NASL", "EULEROS_SA-2021-2101.NASL", "EULEROS_SA-2021-2103.NASL", "EULEROS_SA-2021-2132.NASL", "EULEROS_SA-2021-2136.NASL", "EULEROS_SA-2021-2141.NASL", "EULEROS_SA-2021-2155.NASL", "EULEROS_SA-2021-2159.NASL", "EULEROS_SA-2021-2169.NASL", "EULEROS_SA-2021-2185.NASL", "EULEROS_SA-2021-2186.NASL", "EULEROS_SA-2021-2193.NASL", "EULEROS_SA-2021-2197.NASL", "EULEROS_SA-2021-2216.NASL", "EULEROS_SA-2021-2225.NASL", "EULEROS_SA-2021-2249.NASL", "EULEROS_SA-2021-2254.NASL", "EULEROS_SA-2021-2275.NASL", "EULEROS_SA-2021-2280.NASL", "EULEROS_SA-2021-2306.NASL", "EULEROS_SA-2021-2307.NASL", "EULEROS_SA-2021-2313.NASL", "EULEROS_SA-2021-2339.NASL", "EULEROS_SA-2021-2346.NASL", "EULEROS_SA-2021-2374.NASL", "EULEROS_SA-2021-2406.NASL", "EULEROS_SA-2021-2407.NASL", "EULEROS_SA-2021-2427.NASL", "EULEROS_SA-2021-2443.NASL", "EULEROS_SA-2021-2474.NASL", "EULEROS_SA-2021-2485.NASL", "EULEROS_SA-2021-2508.NASL", "EULEROS_SA-2021-2510.NASL", "EULEROS_SA-2021-2535.NASL", "EULEROS_SA-2021-2536.NASL", "EULEROS_SA-2021-2541.NASL", "EULEROS_SA-2021-2559.NASL", "EULEROS_SA-2021-2560.NASL", "EULEROS_SA-2021-2565.NASL", "EULEROS_SA-2021-2595.NASL", "EULEROS_SA-2021-2613.NASL", "EULEROS_SA-2021-2734.NASL", "EULEROS_SA-2021-2747.NASL", "EULEROS_SA-2021-2783.NASL", "EULEROS_SA-2021-2786.NASL", "EULEROS_SA-2021-2823.NASL", "EULEROS_SA-2021-2831.NASL", "EULEROS_SA-2021-2833.NASL", "EULEROS_SA-2021-2875.NASL", "EULEROS_SA-2021-2876.NASL", "EULEROS_SA-2021-2884.NASL", "EULEROS_SA-2021-2892.NASL", "EULEROS_SA-2022-1082.NASL", "EULEROS_SA-2022-1083.NASL", "EULEROS_SA-2022-1084.NASL", "EULEROS_SA-2022-1131.NASL", "EULEROS_SA-2022-1132.NASL", "EULEROS_SA-2022-1143.NASL", "EULEROS_SA-2022-1191.NASL", "EULEROS_SA-2022-1265.NASL", "EULEROS_SA-2022-1688.NASL", "EULEROS_SA-2022-1711.NASL", "EULEROS_SA-2022-2274.NASL", "EULEROS_SA-2022-2294.NASL", "EULEROS_SA-2022-2323.NASL", "EULEROS_SA-2022-2350.NASL", "EULEROS_SA-2022-2386.NASL", "EULEROS_SA-2022-2491.NASL", "EULEROS_SA-2022-2511.NASL", "EULEROS_SA-2022-2740.NASL", "EULEROS_SA-2022-2775.NASL", "EULEROS_SA-2022-2828.NASL", "EULEROS_SA-2022-2854.NASL", "EULEROS_SA-2023-1055.NASL", "EULEROS_SA-2023-1152.NASL", "EULEROS_SA-2023-1173.NASL", "EULEROS_SA-2023-1201.NASL", "EULEROS_SA-2023-1231.NASL", "EULEROS_SA-2023-1271.NASL", "EULEROS_SA-2023-1273.NASL", "EULEROS_SA-2023-1296.NASL", "EULEROS_SA-2023-1306.NASL", "EULEROS_SA-2023-1734.NASL", "EULEROS_SA-2023-2183.NASL", "F5_BIGIP_SOL05295469.NASL", "F5_BIGIP_SOL08641512.NASL", "F5_BIGIP_SOL15402727.NASL", "F5_BIGIP_SOL33101555.NASL", "F5_BIGIP_SOL44945790.NASL", "F5_BIGIP_SOL52494142.NASL", "F5_BIGIP_SOL61186963.NASL", "F5_BIGIP_SOL63525058.NASL", "F5_BIGIP_SOL68251873.NASL", "F5_BIGIP_SOL78284681.NASL", "FEDORA_2019-0D3FCAE639.NASL", "FEDORA_2019-139FCDA84D.NASL", "FEDORA_2019-18868E1715.NASL", "FEDORA_2019-2F259A6C0A.NASL", "FEDORA_2019-3FA5DB9E19.NASL", "FEDORA_2019-46B6BD2459.NASL", "FEDORA_2019-57462FA10D.NASL", "FEDORA_2019-613EDFE68B.NASL", "FEDORA_2019-672AE0F060.NASL", "FEDORA_2019-74BA24605E.NASL", "FEDORA_2019-758824A3FF.NASL", "FEDORA_2019-75A8DA28F0.NASL", "FEDORA_2019-7EC5BB5D22.NASL", "FEDORA_2019-8B0AD69829.NASL", "FEDORA_2019-9505C6B555.NASL", "FEDORA_2019-A268BA7B23.NASL", "FEDORA_2019-B06EC6159B.NASL", "FEDORA_2019-D202CDA4F8.NASL", "FEDORA_2019-E70C729D8A.NASL", "FEDORA_2020-0477F8840E.NASL", "FEDORA_2020-0AB6656303.NASL", "FEDORA_2020-0C71C00AF4.NASL", "FEDORA_2020-0CCE3578E2.NASL", "FEDORA_2020-0DF38B2843.NASL", "FEDORA_2020-126A0DD319.NASL", "FEDORA_2020-145877BCD3.NASL", "FEDORA_2020-1DDD5273D6.NASL", "FEDORA_2020-20AB468A33.NASL", "FEDORA_2020-221823EBDD.NASL", "FEDORA_2020-22D278923A.NASL", "FEDORA_2020-27B577AB23.NASL", "FEDORA_2020-2FAF839786.NASL", "FEDORA_2020-32193CBBE6.NASL", "FEDORA_2020-35087800BE.NASL", "FEDORA_2020-41FE1680F6.NASL", "FEDORA_2020-43D5A372FC.NASL", "FEDORA_2020-4F78F122A3.NASL", "FEDORA_2020-55F1F7CB13.NASL", "FEDORA_2020-5A77F0D68F.NASL", "FEDORA_2020-5D9F0CE2B3.NASL", "FEDORA_2020-62D2FF9FA8.NASL", "FEDORA_2020-6A88DAD4A0.NASL", "FEDORA_2020-6AF1DD2936.NASL", "FEDORA_2020-705C6EA5BE.NASL", "FEDORA_2020-76B705BB63.NASL", "FEDORA_2020-7773C53BC8.NASL", "FEDORA_2020-7906A64449.NASL", "FEDORA_2020-7AB62C73BC.NASL", "FEDORA_2020-7DD29DACAD.NASL", "FEDORA_2020-826B24C329.NASL", "FEDORA_2020-87C0A0A52D.NASL", "FEDORA_2020-887D3FA26F.NASL", "FEDORA_2020-8BDD3FD7A4.NASL", "FEDORA_2020-9336B65F82.NASL", "FEDORA_2020-935F62C3D9.NASL", "FEDORA_2020-97D775E649.NASL", "FEDORA_2020-982B2950DB.NASL", "FEDORA_2020-98E0F0F11B.NASL", "FEDORA_2020-AAB24D3714.NASL", "FEDORA_2020-AD05132742.NASL", "FEDORA_2020-B11CF352BD.NASL", "FEDORA_2020-B40FC174B5.NASL", "FEDORA_2020-B513391CA8.NASL", "FEDORA_2020-B60DBDD538.NASL", "FEDORA_2020-B6AAF25741.NASL", "FEDORA_2020-BB919E575E.NASL", "FEDORA_2020-BC9A739F0C.NASL", "FEDORA_2020-BF829F9A84.NASL", "FEDORA_2020-C3B07CC5C9.NASL", "FEDORA_2020-C539BABB0A.NASL", "FEDORA_2020-C663FBC46C.NASL", "FEDORA_2020-C76A35B209.NASL", "FEDORA_2020-CEAF490686.NASL", "FEDORA_2020-D30881C970.NASL", "FEDORA_2020-D42CB01973.NASL", "FEDORA_2020-D808FDD597.NASL", "FEDORA_2020-DA832CB434.NASL", "FEDORA_2020-DFB11916CC.NASL", "FEDORA_2020-E21BD401AD.NASL", "FEDORA_2020-E33ACDEA18.NASL", "FEDORA_2020-E8A7566E80.NASL", "FEDORA_2020-E9251DE272.NASL", "FEDORA_2020-EA11CB5CCC.NASL", "FEDORA_2020-EA5BDBCC90.NASL", "FEDORA_2020-EFB908B6A8.NASL", "FEDORA_2020-F7D15C8B77.NASL", "FEDORA_2020-FF317550E4.NASL", "FEDORA_2021-1BB399A5AF.NASL", "FEDORA_2021-234D14BFCC.NASL", "FEDORA_2021-2897F5366C.NASL", "FEDORA_2021-2CB63D912A.NASL", "FEDORA_2021-309BC2E727.NASL", "FEDORA_2021-324479472C.NASL", "FEDORA_2021-3352C1C802.NASL", "FEDORA_2021-662680E477.NASL", "FEDORA_2021-6E581C051A.NASL", "FEDORA_2021-6FEB090C97.NASL", "FEDORA_2021-7547AD987F.NASL", "FEDORA_2021-7C1BB32D13.NASL", "FEDORA_2021-7D3A9004E2.NASL", "FEDORA_2021-8840CBDCCD.NASL", "FEDORA_2021-8D52A8A999.NASL", "FEDORA_2021-907F3BACAE.NASL", "FEDORA_2021-B1843407CA.NASL", "FEDORA_2021-B326FCB83F.NASL", "FEDORA_2021-B76EDE8F4D.NASL", "FEDORA_2021-EF83E8525A.NASL", "FEDORA_2021-F4FD9372C7.NASL", "FREEBSD_PKG_11FCFA8FAC6411EA9DAB000D3AB229D6.NASL", "FREEBSD_PKG_1E7FA41BF6CA4FE8BD460E176B42B14F.NASL", "FREEBSD_PKG_2272E6F1F02911EA838A0011D823EEBD.NASL", "FREEBSD_PKG_2CB21232FB3211EAA929A4BF014BF5F7.NASL", "FREEBSD_PKG_33C05D57BF6E11EABA1E0800273F78D3.NASL", "FREEBSD_PKG_38A4A043E93711EB9B84D4C9EF517024.NASL", "FREEBSD_PKG_3C77F1393A0911EB929DD4C9EF517024.NASL", "FREEBSD_PKG_3D7DFD63823B11EAB3A8240A644DD835.NASL", "FREEBSD_PKG_3FCB70A4E22D11EA98B2080027846A02.NASL", "FREEBSD_PKG_4BB56D2FA5B011EAA86008002728F74C.NASL", "FREEBSD_PKG_524BD03ABB7511EBBF35080027F515EA.NASL", "FREEBSD_PKG_56BA4513A1BE11EB9072D4C9EF517024.NASL", "FREEBSD_PKG_5A668AB38D8611EBB8D6D4C9EF517024.NASL", "FREEBSD_PKG_6193B3F6548C11EBBA01206A8A720317.NASL", "FREEBSD_PKG_6BFF5CA6B61A11EAAEF408002728F74C.NASL", "FREEBSD_PKG_9B7491FBF25311E9A50C000C29C4DC65.NASL", "FREEBSD_PKG_A27B0BB684FC11EAB5B4641C67A117D8.NASL", "FREEBSD_PKG_B905DFF4E22711EAB0EA08002728F74C.NASL", "FREEBSD_PKG_C0C1834C976111EBACFD0022489AD614.NASL", "FREEBSD_PKG_C4AC9C79AB3711EA8B5EB42E99A1B9C3.NASL", "FREEBSD_PKG_C7855866C51111EBAE1DB42E991FC52E.NASL", "FREEBSD_PKG_C9C6C2F8CD5411E9AF89080027EF1A23.NASL", "FREEBSD_PKG_E84831158B8E11EABDCF001B217B3468.NASL", "FREEBSD_PKG_EF5B4F5FA65811EA80D7001CC0382B2F.NASL", "FREEBSD_PKG_F59AF30807F311EA8C56F8B156B6DCC8.NASL", "FREEBSD_PKG_F5ABAFC0FCF611EA8758E0D55E2A8BF9.NASL", "FREEBSD_PKG_FDC499723CA711EB929DD4C9EF517024.NASL", "GENTOO_GLSA-201908-11.NASL", "GENTOO_GLSA-201911-08.NASL", "GENTOO_GLSA-202003-27.NASL", "GENTOO_GLSA-202003-32.NASL", "GENTOO_GLSA-202004-08.NASL", "GENTOO_GLSA-202005-09.NASL", "GENTOO_GLSA-202006-01.NASL", "GENTOO_GLSA-202006-04.NASL", "GENTOO_GLSA-202006-16.NASL", "GENTOO_GLSA-202007-16.NASL", "GENTOO_GLSA-202007-26.NASL", "GENTOO_GLSA-202008-01.NASL", "GENTOO_GLSA-202009-01.NASL", "GENTOO_GLSA-202010-04.NASL", "GENTOO_GLSA-202011-17.NASL", "GENTOO_GLSA-202012-10.NASL", "GENTOO_GLSA-202012-14.NASL", "GENTOO_GLSA-202101-18.NASL", "GENTOO_GLSA-202101-20.NASL", "GENTOO_GLSA-202101-33.NASL", "GENTOO_GLSA-202103-03.NASL", "GENTOO_GLSA-202104-04.NASL", "GENTOO_GLSA-202105-31.NASL", "GENTOO_GLSA-202105-34.NASL", "GENTOO_GLSA-202107-05.NASL", "GENTOO_GLSA-202107-07.NASL", "GENTOO_GLSA-202107-36.NASL", "GENTOO_GLSA-202107-43.NASL", "GOOGLE_CHROME_78_0_3904_70.NASL", "IBM_COGNOS_6986505.NASL", "IBM_HTTP_SERVER_964768.NASL", "ICLOUD_10_9.NASL", "ICLOUD_7_16.NASL", "ITUNES_12_10_3.NASL", "ITUNES_12_10_3_BANNER.NASL", "JUNIPER_JSA11207.NASL", "JUNIPER_JSA69705.NASL", "LCE_6_0_9.NASL", "MACOSX_GOOGLE_CHROME_78_0_3904_70.NASL", "MACOS_FIREFOX_68_2_ESR.NASL", "MACOS_FIREFOX_70_0.NASL", "MACOS_HT210788.NASL", "MACOS_HT211289.NASL", "MACOS_HT211931.NASL", "MACOS_HT212147.NASL", "MACOS_HT212325.NASL", "MACOS_HT212326.NASL", "MACOS_HT212327.NASL", "MACOS_MS22_APR_VISUAL_STUDIO.NASL", "MACOS_THUNDERBIRD_68_2.NASL", "MOZILLA_FIREFOX_68_2_ESR.NASL", "MOZILLA_FIREFOX_70_0.NASL", "MOZILLA_THUNDERBIRD_68_2.NASL", "MYSQL_5_7_34.NASL", "MYSQL_8_0_24.NASL", "MYSQL_8_0_26.NASL", "MYSQL_ENTERPRISE_MONITOR_8_0_24.NASL", "NESSUS_TNS_2021_04.NASL", "NESSUS_TNS_2021_11.NASL", "NEWSTART_CGSL_NS-SA-2019-0215_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2019-0260_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2020-0002_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2020-0003_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2020-0022_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2021-0002_THUNDERBIRD.NASL", "NEWSTART_CGSL_NS-SA-2021-0015_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2021-0016_LIBXML2.NASL", "NEWSTART_CGSL_NS-SA-2021-0018_CURL.NASL", "NEWSTART_CGSL_NS-SA-2021-0026_EXPAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0029_PYTHON3.NASL", "NEWSTART_CGSL_NS-SA-2021-0043_CPIO.NASL", "NEWSTART_CGSL_NS-SA-2021-0049_LIBREPO.NASL", "NEWSTART_CGSL_NS-SA-2021-0053_GLIBC.NASL", "NEWSTART_CGSL_NS-SA-2021-0057_LIBREPO.NASL", "NEWSTART_CGSL_NS-SA-2021-0059_PYTHON3.NASL", "NEWSTART_CGSL_NS-SA-2021-0060_LIBSOLV.NASL", "NEWSTART_CGSL_NS-SA-2021-0061_LIBXML2.NASL", "NEWSTART_CGSL_NS-SA-2021-0067_CURL.NASL", "NEWSTART_CGSL_NS-SA-2021-0069_LIBSSH.NASL", "NEWSTART_CGSL_NS-SA-2021-0070_PCRE2.NASL", "NEWSTART_CGSL_NS-SA-2021-0071_CYRUS-SASL.NASL", "NEWSTART_CGSL_NS-SA-2021-0071_LIBGCRYPT.NASL", "NEWSTART_CGSL_NS-SA-2021-0074_GNUTLS.NASL", "NEWSTART_CGSL_NS-SA-2021-0076_GNUPG2.NASL", "NEWSTART_CGSL_NS-SA-2021-0079_LIBARCHIVE.NASL", "NEWSTART_CGSL_NS-SA-2021-0081_PYTHON-PIP.NASL", "NEWSTART_CGSL_NS-SA-2021-0083_EXPAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0095_GLIBC.NASL", "NEWSTART_CGSL_NS-SA-2021-0109_NETTLE.NASL", "NEWSTART_CGSL_NS-SA-2021-0130_PYTHON-URLLIB3.NASL", "NEWSTART_CGSL_NS-SA-2021-0132_NETTLE.NASL", "NEWSTART_CGSL_NS-SA-2021-0133_GNUTLS.NASL", "NEWSTART_CGSL_NS-SA-2021-0147_PYTHON3.NASL", "NEWSTART_CGSL_NS-SA-2021-0148_LIBXML2.NASL", "NEWSTART_CGSL_NS-SA-2021-0152_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2021-0154_CURL.NASL", "NEWSTART_CGSL_NS-SA-2021-0169_CPIO.NASL", "NEWSTART_CGSL_NS-SA-2021-0170_LIBREPO.NASL", "NEWSTART_CGSL_NS-SA-2021-0175_EXPAT.NASL", "NEWSTART_CGSL_NS-SA-2021-0180_GLIBC.NASL", "NEWSTART_CGSL_NS-SA-2022-0039_NETTLE.NASL", "NEWSTART_CGSL_NS-SA-2022-0048_WEBKIT2GTK3.NASL", "NEWSTART_CGSL_NS-SA-2022-0049_PYTHON3.NASL", "NEWSTART_CGSL_NS-SA-2022-0050_LIBXML2.NASL", "NEWSTART_CGSL_NS-SA-2022-0051_LZ4.NASL", "NEWSTART_CGSL_NS-SA-2022-0052_SQLITE.NASL", "NEWSTART_CGSL_NS-SA-2022-0053_GLIB2.NASL", "NEWSTART_CGSL_NS-SA-2022-0055_SYSTEMD.NASL", "NEWSTART_CGSL_NS-SA-2022-0057_KRB5.NASL", "NEWSTART_CGSL_NS-SA-2022-0059_CPIO.NASL", "NEWSTART_CGSL_NS-SA-2022-0066_P11-KIT.NASL", "NEWSTART_CGSL_NS-SA-2022-0083_CURL.NASL", "NEWSTART_CGSL_NS-SA-2022-0085_GLIBC.NASL", "NEWSTART_CGSL_NS-SA-2022-0092_LIBARCHIVE.NASL", "NEWSTART_CGSL_NS-SA-2022-0100_SUDO.NASL", "NEWSTART_CGSL_NS-SA-2022-0102_PYTHON.NASL", "NEWSTART_CGSL_NS-SA-2023-0008_PYTHON.NASL", "NNM_5_13_1.NASL", "NUTANIX_NXSA-AHV-20201105_1021.NASL", "NUTANIX_NXSA-AHV-20201105_1082.NASL", "NUTANIX_NXSA-AHV-20201105_2030.NASL", "NUTANIX_NXSA-AHV-20201105_2267.NASL", "NUTANIX_NXSA-AHV-20201105_30142.NASL", "NUTANIX_NXSA-AHV-20220304_10013.NASL", "NUTANIX_NXSA-AHV-20220304_242.NASL", "NUTANIX_NXSA-AOS-5_15_5.NASL", "NUTANIX_NXSA-AOS-5_15_5_5.NASL", "NUTANIX_NXSA-AOS-5_15_6.NASL", "NUTANIX_NXSA-AOS-5_15_7.NASL", "NUTANIX_NXSA-AOS-5_19_0_5.NASL", "NUTANIX_NXSA-AOS-5_19_1.NASL", "NUTANIX_NXSA-AOS-5_19_1_5.NASL", "NUTANIX_NXSA-AOS-5_19_2.NASL", "NUTANIX_NXSA-AOS-5_20.NASL", "NUTANIX_NXSA-AOS-5_20_1.NASL", "NUTANIX_NXSA-AOS-5_20_3.NASL", "NUTANIX_NXSA-AOS-5_20_4.NASL", "NUTANIX_NXSA-AOS-5_20_5.NASL", "NUTANIX_NXSA-AOS-6_0.NASL", "NUTANIX_NXSA-AOS-6_0_1.NASL", "NUTANIX_NXSA-AOS-6_0_2_5.NASL", "NUTANIX_NXSA-AOS-6_1.NASL", "NUTANIX_NXSA-AOS-6_1_1.NASL", "NUTANIX_NXSA-AOS-6_5_1_5.NASL", "NUTANIX_NXSA-AOS-6_5_2.NASL", "NUTANIX_NXSA-AOS-6_6.NASL", "OPENSSL_1_1_1K.NASL", "OPENSUSE-2018-1365.NASL", "OPENSUSE-2018-1366.NASL", "OPENSUSE-2019-1450.NASL", "OPENSUSE-2019-1749.NASL", "OPENSUSE-2019-1777.NASL", "OPENSUSE-2019-1798.NASL", "OPENSUSE-2019-1917.NASL", "OPENSUSE-2019-20.NASL", "OPENSUSE-2019-2161.NASL", "OPENSUSE-2019-2204.NASL", "OPENSUSE-2019-2205.NASL", "OPENSUSE-2019-2389.NASL", "OPENSUSE-2019-2393.NASL", "OPENSUSE-2019-2420.NASL", "OPENSUSE-2019-2438.NASL", "OPENSUSE-2019-2451.NASL", "OPENSUSE-2019-2452.NASL", "OPENSUSE-2019-2453.NASL", "OPENSUSE-2019-2459.NASL", "OPENSUSE-2019-2464.NASL", "OPENSUSE-2019-2593.NASL", "OPENSUSE-2019-2596.NASL", "OPENSUSE-2019-2689.NASL", "OPENSUSE-2019-888.NASL", "OPENSUSE-2020-1002.NASL", "OPENSUSE-2020-102.NASL", "OPENSUSE-2020-1254.NASL", "OPENSUSE-2020-1257.NASL", "OPENSUSE-2020-1258.NASL", "OPENSUSE-2020-1265.NASL", "OPENSUSE-2020-1289.NASL", "OPENSUSE-2020-1345.NASL", "OPENSUSE-2020-1359.NASL", "OPENSUSE-2020-1430.NASL", "OPENSUSE-2020-1465.NASL", "OPENSUSE-2020-1494.NASL", "OPENSUSE-2020-1578.NASL", "OPENSUSE-2020-1598.NASL", "OPENSUSE-2020-1613.NASL", "OPENSUSE-2020-1724.NASL", "OPENSUSE-2020-1743.NASL", "OPENSUSE-2020-1859.NASL", "OPENSUSE-2020-1988.NASL", "OPENSUSE-2020-2037.NASL", "OPENSUSE-2020-2062.NASL", "OPENSUSE-2020-2143.NASL", "OPENSUSE-2020-2152.NASL", "OPENSUSE-2020-2169.NASL", "OPENSUSE-2020-2184.NASL", "OPENSUSE-2020-2185.NASL", "OPENSUSE-2020-2189.NASL", "OPENSUSE-2020-2190.NASL", "OPENSUSE-2020-22.NASL", "OPENSUSE-2020-2211.NASL", "OPENSUSE-2020-2238.NASL", "OPENSUSE-2020-2249.NASL", "OPENSUSE-2020-2304.NASL", "OPENSUSE-2020-2310.NASL", "OPENSUSE-2020-2332.NASL", "OPENSUSE-2020-2333.NASL", "OPENSUSE-2020-274.NASL", "OPENSUSE-2020-510.NASL", "OPENSUSE-2020-681.NASL", "OPENSUSE-2020-781.NASL", "OPENSUSE-2020-790.NASL", "OPENSUSE-2020-802.NASL", "OPENSUSE-2020-86.NASL", "OPENSUSE-2020-883.NASL", "OPENSUSE-2020-908.NASL", "OPENSUSE-2020-931.NASL", "OPENSUSE-2020-940.NASL", "OPENSUSE-2020-989.NASL", "OPENSUSE-2021-1058.NASL", "OPENSUSE-2021-1059.NASL", "OPENSUSE-2021-1061.NASL", "OPENSUSE-2021-1130.NASL", "OPENSUSE-2021-1206.NASL", "OPENSUSE-2021-1366.NASL", "OPENSUSE-2021-1441.NASL", "OPENSUSE-2021-1611.NASL", "OPENSUSE-2021-169.NASL", "OPENSUSE-2021-170.NASL", "OPENSUSE-2021-1825.NASL", "OPENSUSE-2021-1917.NASL", "OPENSUSE-2021-2012.NASL", "OPENSUSE-2021-2320.NASL", "OPENSUSE-2021-2327.NASL", "OPENSUSE-2021-2353.NASL", "OPENSUSE-2021-2575.NASL", "OPENSUSE-2021-2637.NASL", "OPENSUSE-2021-2682.NASL", "OPENSUSE-2021-2685.NASL", "OPENSUSE-2021-270.NASL", "OPENSUSE-2021-277.NASL", "OPENSUSE-2021-2795.NASL", "OPENSUSE-2021-2817.NASL", "OPENSUSE-2021-331.NASL", "OPENSUSE-2021-3529.NASL", "OPENSUSE-2021-358.NASL", "OPENSUSE-2021-3942.NASL", "OPENSUSE-2021-4154.NASL", "OPENSUSE-2021-435.NASL", "OPENSUSE-2021-468.NASL", "OPENSUSE-2021-476.NASL", "OPENSUSE-2021-635.NASL", "OPENSUSE-2021-692.NASL", "OPENSUSE-2021-760.NASL", "OPENSUSE-2021-764.NASL", "OPENSUSE-2021-886.NASL", "OPENSUSE-2022-0182-1.NASL", "ORACLELINUX_ELSA-2019-3193.NASL", "ORACLELINUX_ELSA-2019-3196.NASL", "ORACLELINUX_ELSA-2019-3210.NASL", "ORACLELINUX_ELSA-2019-3237.NASL", "ORACLELINUX_ELSA-2020-2637.NASL", "ORACLELINUX_ELSA-2020-2755.NASL", "ORACLELINUX_ELSA-2020-2848.NASL", "ORACLELINUX_ELSA-2020-2852.NASL", "ORACLELINUX_ELSA-2020-3658.NASL", "ORACLELINUX_ELSA-2020-3662.NASL", "ORACLELINUX_ELSA-2020-3888.NASL", "ORACLELINUX_ELSA-2020-3908.NASL", "ORACLELINUX_ELSA-2020-3911.NASL", "ORACLELINUX_ELSA-2020-3952.NASL", "ORACLELINUX_ELSA-2020-4432.NASL", "ORACLELINUX_ELSA-2020-4433.NASL", "ORACLELINUX_ELSA-2020-4443.NASL", "ORACLELINUX_ELSA-2020-4479.NASL", "ORACLELINUX_ELSA-2020-4482.NASL", "ORACLELINUX_ELSA-2020-4484.NASL", "ORACLELINUX_ELSA-2020-4490.NASL", "ORACLELINUX_ELSA-2020-4497.NASL", "ORACLELINUX_ELSA-2020-4508.NASL", "ORACLELINUX_ELSA-2020-4539.NASL", "ORACLELINUX_ELSA-2020-4545.NASL", "ORACLELINUX_ELSA-2020-4599.NASL", "ORACLELINUX_ELSA-2020-5002.NASL", "ORACLELINUX_ELSA-2020-5009.NASL", "ORACLELINUX_ELSA-2020-5010.NASL", "ORACLELINUX_ELSA-2020-5012.NASL", "ORACLELINUX_ELSA-2020-5483.NASL", "ORACLELINUX_ELSA-2021-0348.NASL", "ORACLELINUX_ELSA-2021-1024.NASL", "ORACLELINUX_ELSA-2021-1145.NASL", "ORACLELINUX_ELSA-2021-1206.NASL", "ORACLELINUX_ELSA-2021-1581.NASL", "ORACLELINUX_ELSA-2021-1582.NASL", "ORACLELINUX_ELSA-2021-1585.NASL", "ORACLELINUX_ELSA-2021-1586.NASL", "ORACLELINUX_ELSA-2021-1593.NASL", "ORACLELINUX_ELSA-2021-1597.NASL", "ORACLELINUX_ELSA-2021-1609.NASL", "ORACLELINUX_ELSA-2021-1610.NASL", "ORACLELINUX_ELSA-2021-1611.NASL", "ORACLELINUX_ELSA-2021-1631.NASL", "ORACLELINUX_ELSA-2021-1633.NASL", "ORACLELINUX_ELSA-2021-1675.NASL", "ORACLELINUX_ELSA-2021-1679.NASL", "ORACLELINUX_ELSA-2021-1702.NASL", "ORACLELINUX_ELSA-2021-1723.NASL", "ORACLELINUX_ELSA-2021-1761.NASL", "ORACLELINUX_ELSA-2021-1879.NASL", "ORACLELINUX_ELSA-2021-2569.NASL", "ORACLELINUX_ELSA-2021-2574.NASL", "ORACLELINUX_ELSA-2021-2575.NASL", "ORACLELINUX_ELSA-2021-4151.NASL", "ORACLELINUX_ELSA-2021-4160.NASL", "ORACLELINUX_ELSA-2021-4162.NASL", "ORACLELINUX_ELSA-2021-4373.NASL", "ORACLELINUX_ELSA-2021-4785.NASL", "ORACLELINUX_ELSA-2021-9151.NASL", "ORACLELINUX_ELSA-2021-9280.NASL", "ORACLELINUX_ELSA-2021-9294.NASL", "ORACLELINUX_ELSA-2021-9344.NASL", "ORACLELINUX_ELSA-2022-0827.NASL", "ORACLELINUX_ELSA-2022-0830.NASL", "ORACLELINUX_ELSA-2022-5234.NASL", "ORACLELINUX_ELSA-2022-5235.NASL", "ORACLELINUX_ELSA-2022-9204.NASL", "ORACLE_ACCESS_MANAGER_CPU_APR_2023.NASL", "ORACLE_HTTP_SERVER_CPU_APR_2022.NASL", "ORACLE_HTTP_SERVER_CPU_OCT_2021.NASL", "ORACLE_MYSQL_CONNECTORS_CPU_JUL_2021.NASL", "ORACLE_RDBMS_CPU_JUL_2021.NASL", "PHOTONOS_PHSA-2019-1_0-0228_SYSTEMD.NASL", "PHOTONOS_PHSA-2019-1_0-0237_GNUPG.NASL", "PHOTONOS_PHSA-2019-1_0-0245_GLIB.NASL", "PHOTONOS_PHSA-2019-1_0-0246_GNUPG.NASL", "PHOTONOS_PHSA-2019-1_0-0247_EXPAT.NASL", "PHOTONOS_PHSA-2019-2_0-0153_SYSTEMD.NASL", "PHOTONOS_PHSA-2019-2_0-0171_EXPAT.NASL", "PHOTONOS_PHSA-2019-2_0-0171_GLIB.NASL", "PHOTONOS_PHSA-2019-2_0-0171_GNUPG.NASL", "PHOTONOS_PHSA-2019-2_0-0182_PYTHON2.NASL", "PHOTONOS_PHSA-2019-2_0-0182_PYTHON3.NASL", "PHOTONOS_PHSA-2019-3_0-0024_GLIB.NASL", "PHOTONOS_PHSA-2019-3_0-0024_GNUPG.NASL", "PHOTONOS_PHSA-2019-3_0-0026_EXPAT.NASL", "PHOTONOS_PHSA-2019-3_0-0035_PYTHON2.NASL", "PHOTONOS_PHSA-2020-1_0-0267_CPIO.NASL", "PHOTONOS_PHSA-2020-1_0-0271_LIBXML2.NASL", "PHOTONOS_PHSA-2020-1_0-0277_BASH.NASL", "PHOTONOS_PHSA-2020-1_0-0283_CYRUS.NASL", "PHOTONOS_PHSA-2020-1_0-0288_PYTHON2.NASL", "PHOTONOS_PHSA-2020-1_0-0298_SQLITE.NASL", "PHOTONOS_PHSA-2020-1_0-0301_EXPAT.NASL", "PHOTONOS_PHSA-2020-1_0-0301_SYSTEMD.NASL", "PHOTONOS_PHSA-2020-1_0-0304_CURL.NASL", "PHOTONOS_PHSA-2020-1_0-0304_NGHTTP2.NASL", "PHOTONOS_PHSA-2020-1_0-0304_PYTHON3.NASL", "PHOTONOS_PHSA-2020-1_0-0308_SQLITE.NASL", "PHOTONOS_PHSA-2020-1_0-0309_PYTHON2.NASL", "PHOTONOS_PHSA-2020-1_0-0309_PYTHON3.NASL", "PHOTONOS_PHSA-2020-1_0-0315_CURL.NASL", "PHOTONOS_PHSA-2020-1_0-0330_GNUTLS.NASL", "PHOTONOS_PHSA-2020-1_0-0332_PYTHON3.NASL", "PHOTONOS_PHSA-2020-1_0-0338_PYTHON3.NASL", "PHOTONOS_PHSA-2020-1_0-0346_CURL.NASL", "PHOTONOS_PHSA-2020-2_0-0202_CPIO.NASL", "PHOTONOS_PHSA-2020-2_0-0203_LIBXML2.NASL", "PHOTONOS_PHSA-2020-2_0-0207_LIBARCHIVE.NASL", "PHOTONOS_PHSA-2020-2_0-0208_BASH.NASL", "PHOTONOS_PHSA-2020-2_0-0225_LIBXML2.NASL", "PHOTONOS_PHSA-2020-2_0-0226_PYTHON3.NASL", "PHOTONOS_PHSA-2020-2_0-0249_SQLITE.NASL", "PHOTONOS_PHSA-2020-2_0-0252_SYSTEMD.NASL", "PHOTONOS_PHSA-2020-2_0-0254_EXPAT.NASL", "PHOTONOS_PHSA-2020-2_0-0254_NGHTTP2.NASL", "PHOTONOS_PHSA-2020-2_0-0255_CURL.NASL", "PHOTONOS_PHSA-2020-2_0-0258_PYTHON3.NASL", "PHOTONOS_PHSA-2020-2_0-0261_SQLITE.NASL", "PHOTONOS_PHSA-2020-2_0-0265_PYTHON2.NASL", "PHOTONOS_PHSA-2020-2_0-0265_PYTHON3.NASL", "PHOTONOS_PHSA-2020-2_0-0273_CURL.NASL", "PHOTONOS_PHSA-2020-2_0-0285_LIBXML2.NASL", "PHOTONOS_PHSA-2020-2_0-0288_GNUTLS.NASL", "PHOTONOS_PHSA-2020-2_0-0289_PYTHON3.NASL", "PHOTONOS_PHSA-2020-2_0-0295_PYTHON3.NASL", "PHOTONOS_PHSA-2020-2_0-0304_CURL.NASL", "PHOTONOS_PHSA-2020-3_0-0053_CPIO.NASL", "PHOTONOS_PHSA-2020-3_0-0055_LIBARCHIVE.NASL", "PHOTONOS_PHSA-2020-3_0-0055_LIBXML2.NASL", "PHOTONOS_PHSA-2020-3_0-0057_BASH.NASL", "PHOTONOS_PHSA-2020-3_0-0057_LIBSOLV.NASL", "PHOTONOS_PHSA-2020-3_0-0077_CYRUS.NASL", "PHOTONOS_PHSA-2020-3_0-0078_PYTHON2.NASL", "PHOTONOS_PHSA-2020-3_0-0078_PYTHON3.NASL", "PHOTONOS_PHSA-2020-3_0-0101_SQLITE.NASL", "PHOTONOS_PHSA-2020-3_0-0103_GNUTLS.NASL", "PHOTONOS_PHSA-2020-3_0-0103_SYSTEMD.NASL", "PHOTONOS_PHSA-2020-3_0-0105_NGHTTP2.NASL", "PHOTONOS_PHSA-2020-3_0-0106_CURL.NASL", "PHOTONOS_PHSA-2020-3_0-0111_PYTHON3.NASL", "PHOTONOS_PHSA-2020-3_0-0113_SQLITE.NASL", "PHOTONOS_PHSA-2020-3_0-0118_PYTHON2.NASL", "PHOTONOS_PHSA-2020-3_0-0118_PYTHON3.NASL", "PHOTONOS_PHSA-2020-3_0-0129_CURL.NASL", "PHOTONOS_PHSA-2020-3_0-0142_LIBXML2.NASL", "PHOTONOS_PHSA-2020-3_0-0146_GNUTLS.NASL", "PHOTONOS_PHSA-2020-3_0-0155_PYTHON3.NASL", "PHOTONOS_PHSA-2020-3_0-0161_PYTHON3.NASL", "PHOTONOS_PHSA-2020-3_0-0164_LIBREPO.NASL", "PHOTONOS_PHSA-2020-3_0-0174_CURL.NASL", "PHOTONOS_PHSA-2021-1_0-0354_GLIBC.NASL", "PHOTONOS_PHSA-2021-1_0-0356_SUDO.NASL", "PHOTONOS_PHSA-2021-1_0-0360_GLIBC.NASL", "PHOTONOS_PHSA-2021-1_0-0371_GLIBC.NASL", "PHOTONOS_PHSA-2021-1_0-0383_NETTLE.NASL", "PHOTONOS_PHSA-2021-1_0-0383_RPM.NASL", "PHOTONOS_PHSA-2021-2_0-0313_SUDO.NASL", "PHOTONOS_PHSA-2021-2_0-0315_GLIBC.NASL", "PHOTONOS_PHSA-2021-2_0-0320_GLIBC.NASL", "PHOTONOS_PHSA-2021-2_0-0327_PYTHON3.NASL", "PHOTONOS_PHSA-2021-2_0-0329_GLIBC.NASL", "PHOTONOS_PHSA-2021-2_0-0331_NXTGN.NASL", "PHOTONOS_PHSA-2021-2_0-0338_RPM.NASL", "PHOTONOS_PHSA-2021-2_0-0339_NETTLE.NASL", "PHOTONOS_PHSA-2021-2_0-0357_LZ4.NASL", "PHOTONOS_PHSA-2021-2_0-0393_PYTHON.NASL", "PHOTONOS_PHSA-2021-3_0-0186_SUDO.NASL", "PHOTONOS_PHSA-2021-3_0-0189_GLIBC.NASL", "PHOTONOS_PHSA-2021-3_0-0193_GLIBC.NASL", "PHOTONOS_PHSA-2021-3_0-0210_NXTGN.NASL", "PHOTONOS_PHSA-2021-3_0-0214_GLIBC.NASL", "PHOTONOS_PHSA-2021-3_0-0221_RPM.NASL", "PHOTONOS_PHSA-2021-3_0-0223_NETTLE.NASL", "PHOTONOS_PHSA-2021-3_0-0255_LZ4.NASL", "PHOTONOS_PHSA-2021-3_0-0266_PYTHON.NASL", "PHOTONOS_PHSA-2021-3_0-0342_KRB5.NASL", "PHOTONOS_PHSA-2021-4_0-0005_GLIBC.NASL", "PHOTONOS_PHSA-2021-4_0-0007_MYSQL.NASL", "PHOTONOS_PHSA-2021-4_0-0007_OPENSSL.NASL", "PHOTONOS_PHSA-2021-4_0-0007_PYTHON3.NASL", "PHOTONOS_PHSA-2021-4_0-0012_NETTLE.NASL", "PHOTONOS_PHSA-2021-4_0-0047_LZ4.NASL", "PHOTONOS_PHSA-2021-4_0-0052_RPM.NASL", "PHOTONOS_PHSA-2021-4_0-0060_PYTHON3.NASL", "REDHAT-CVE-2020-8177.NASL", "REDHAT-RHSA-2019-3193.NASL", "REDHAT-RHSA-2019-3196.NASL", "REDHAT-RHSA-2019-3210.NASL", "REDHAT-RHSA-2019-3237.NASL", "REDHAT-RHSA-2019-3756.NASL", "REDHAT-RHSA-2020-1605.NASL", "REDHAT-RHSA-2020-2523.NASL", "REDHAT-RHSA-2020-2524.NASL", "REDHAT-RHSA-2020-2637.NASL", "REDHAT-RHSA-2020-2638.NASL", "REDHAT-RHSA-2020-2639.NASL", "REDHAT-RHSA-2020-2644.NASL", "REDHAT-RHSA-2020-2755.NASL", "REDHAT-RHSA-2020-2784.NASL", "REDHAT-RHSA-2020-2823.NASL", "REDHAT-RHSA-2020-2847.NASL", "REDHAT-RHSA-2020-2848.NASL", "REDHAT-RHSA-2020-2849.NASL", "REDHAT-RHSA-2020-2850.NASL", "REDHAT-RHSA-2020-2852.NASL", "REDHAT-RHSA-2020-2895.NASL", "REDHAT-RHSA-2020-3042.NASL", "REDHAT-RHSA-2020-3084.NASL", "REDHAT-RHSA-2020-3658.NASL", "REDHAT-RHSA-2020-3662.NASL", "REDHAT-RHSA-2020-3749.NASL", "REDHAT-RHSA-2020-3756.NASL", "REDHAT-RHSA-2020-3888.NASL", "REDHAT-RHSA-2020-3908.NASL", "REDHAT-RHSA-2020-3911.NASL", "REDHAT-RHSA-2020-3952.NASL", "REDHAT-RHSA-2020-3996.NASL", "REDHAT-RHSA-2020-4273.NASL", "REDHAT-RHSA-2020-4285.NASL", "REDHAT-RHSA-2020-4299.NASL", "REDHAT-RHSA-2020-4432.NASL", "REDHAT-RHSA-2020-4433.NASL", "REDHAT-RHSA-2020-4443.NASL", "REDHAT-RHSA-2020-4479.NASL", "REDHAT-RHSA-2020-4482.NASL", "REDHAT-RHSA-2020-4484.NASL", "REDHAT-RHSA-2020-4490.NASL", "REDHAT-RHSA-2020-4497.NASL", "REDHAT-RHSA-2020-4508.NASL", "REDHAT-RHSA-2020-4539.NASL", "REDHAT-RHSA-2020-4545.NASL", "REDHAT-RHSA-2020-4599.NASL", "REDHAT-RHSA-2020-4641.NASL", "REDHAT-RHSA-2020-4654.NASL", "REDHAT-RHSA-2020-4846.NASL", "REDHAT-RHSA-2020-5002.NASL", "REDHAT-RHSA-2020-5009.NASL", "REDHAT-RHSA-2020-5010.NASL", "REDHAT-RHSA-2020-5012.NASL", "REDHAT-RHSA-2020-5218.NASL", "REDHAT-RHSA-2020-5417.NASL", "REDHAT-RHSA-2020-5483.NASL", "REDHAT-RHSA-2021-0348.NASL", "REDHAT-RHSA-2021-0528.NASL", "REDHAT-RHSA-2021-0761.NASL", "REDHAT-RHSA-2021-0881.NASL", "REDHAT-RHSA-2021-1024.NASL", "REDHAT-RHSA-2021-1063.NASL", "REDHAT-RHSA-2021-1131.NASL", "REDHAT-RHSA-2021-1145.NASL", "REDHAT-RHSA-2021-1189.NASL", "REDHAT-RHSA-2021-1195.NASL", "REDHAT-RHSA-2021-1199.NASL", "REDHAT-RHSA-2021-1202.NASL", "REDHAT-RHSA-2021-1206.NASL", "REDHAT-RHSA-2021-1245.NASL", "REDHAT-RHSA-2021-1246.NASL", "REDHAT-RHSA-2021-1581.NASL", "REDHAT-RHSA-2021-1582.NASL", "REDHAT-RHSA-2021-1585.NASL", "REDHAT-RHSA-2021-1586.NASL", "REDHAT-RHSA-2021-1593.NASL", "REDHAT-RHSA-2021-1597.NASL", "REDHAT-RHSA-2021-1609.NASL", "REDHAT-RHSA-2021-1610.NASL", "REDHAT-RHSA-2021-1611.NASL", "REDHAT-RHSA-2021-1633.NASL", "REDHAT-RHSA-2021-1675.NASL", "REDHAT-RHSA-2021-1679.NASL", "REDHAT-RHSA-2021-1702.NASL", "REDHAT-RHSA-2021-1723.NASL", "REDHAT-RHSA-2021-1761.NASL", "REDHAT-RHSA-2021-1879.NASL", "REDHAT-RHSA-2021-1968.NASL", "REDHAT-RHSA-2021-2239.NASL", "REDHAT-RHSA-2021-2280.NASL", "REDHAT-RHSA-2021-2356.NASL", "REDHAT-RHSA-2021-2472.NASL", "REDHAT-RHSA-2021-2569.NASL", "REDHAT-RHSA-2021-2574.NASL", "REDHAT-RHSA-2021-2575.NASL", "REDHAT-RHSA-2021-2758.NASL", "REDHAT-RHSA-2021-2760.NASL", "REDHAT-RHSA-2021-2791.NASL", "REDHAT-RHSA-2021-3252.NASL", "REDHAT-RHSA-2021-3254.NASL", "REDHAT-RHSA-2021-3366.NASL", "REDHAT-RHSA-2021-3900.NASL", "REDHAT-RHSA-2021-4151.NASL", "REDHAT-RHSA-2021-4160.NASL", "REDHAT-RHSA-2021-4162.NASL", "REDHAT-RHSA-2021-4702.NASL", "REDHAT-RHSA-2021-4771.NASL", "REDHAT-RHSA-2021-4785.NASL", "REDHAT-RHSA-2021-4975.NASL", "REDHAT-RHSA-2022-0073.NASL", "REDHAT-RHSA-2022-0827.NASL", "REDHAT-RHSA-2022-0828.NASL", "REDHAT-RHSA-2022-0829.NASL", "REDHAT-RHSA-2022-0830.NASL", "REDHAT-RHSA-2022-1389.NASL", "REDHAT-RHSA-2022-5234.NASL", "REDHAT-RHSA-2022-5235.NASL", "ROCKY_LINUX_RLSA-2021-2569.NASL", "ROCKY_LINUX_RLSA-2021-2574.NASL", "ROCKY_LINUX_RLSA-2021-2575.NASL", "SECURITYCENTER_5_17_0_TNS_2021_06.NASL", "SECURITYCENTER_5_19_0_TNS_2021_08.NASL", "SECURITYCENTER_5_19_0_TNS_2021_14.NASL", "SECURITYCENTER_OPENSSL_1_1_1K_TNS_2021_03.NASL", "SLACKWARE_SSA_2019-259-01.NASL", "SLACKWARE_SSA_2019-293-01.NASL", "SLACKWARE_SSA_2019-295-01.NASL", "SLACKWARE_SSA_2020-176-01.NASL", "SLACKWARE_SSA_2020-232-01.NASL", "SLACKWARE_SSA_2020-344-01.NASL", "SLACKWARE_SSA_2020-347-01.NASL", "SLACKWARE_SSA_2021-011-01.NASL", "SLACKWARE_SSA_2021-135-01.NASL", "SLACKWARE_SSA_2021-145-01.NASL", "SLACKWARE_SSA_2022-055-01.NASL", "SL_20191029_THUNDERBIRD_ON_SL7_X.NASL", "SL_20191106_THUNDERBIRD_ON_SL6_X.NASL", "SL_20201001_CPIO_ON_SL7_X.NASL", "SL_20201001_EXPAT_ON_SL7_X.NASL", "SL_20201001_LIBXML2_ON_SL7_X.NASL", "SL_20201001_PYTHON3_ON_SL7_X.NASL", "SL_20201001_PYTHON_ON_SL7_X.NASL", "SL_20201110_PYTHON3_ON_SL7_X.NASL", "SL_20201110_PYTHON_ON_SL7_X.NASL", "SL_20210202_GLIBC_ON_SL7_X.NASL", "SL_20220628_PYTHON_ON_SL7_X.NASL", "SL_20220628_PYTHON_VIRTUALENV_ON_SL7_X.NASL", "SMB_NT_MS21_OCT_VISUAL_STUDIO.NASL", "SMB_NT_MS22_MAR_DOTNET_CORE.NASL", "SMB_NT_MS22_MAR_VISUAL_STUDIO.NASL", "SUSE_SU-2018-3571-1.NASL", "SUSE_SU-2018-3640-1.NASL", "SUSE_SU-2018-3640-2.NASL", "SUSE_SU-2019-0023-1.NASL", "SUSE_SU-2019-1102-1.NASL", "SUSE_SU-2019-1265-1.NASL", "SUSE_SU-2019-1364-1.NASL", "SUSE_SU-2019-1364-2.NASL", "SUSE_SU-2019-14084-1.NASL", "SUSE_SU-2019-1824-1.NASL", "SUSE_SU-2019-1830-1.NASL", "SUSE_SU-2019-1830-2.NASL", "SUSE_SU-2019-1833-1.NASL", "SUSE_SU-2019-1834-1.NASL", "SUSE_SU-2019-1835-1.NASL", "SUSE_SU-2019-1877-1.NASL", "SUSE_SU-2019-1958-1.NASL", "SUSE_SU-2019-1958-2.NASL", "SUSE_SU-2019-2006-1.NASL", "SUSE_SU-2019-2349-1.NASL", "SUSE_SU-2019-2429-1.NASL", "SUSE_SU-2019-2440-1.NASL", "SUSE_SU-2019-2480-1.NASL", "SUSE_SU-2019-2510-1.NASL", "SUSE_SU-2019-2743-1.NASL", "SUSE_SU-2019-2748-1.NASL", "SUSE_SU-2019-2748-2.NASL", "SUSE_SU-2019-2802-1.NASL", "SUSE_SU-2019-2871-1.NASL", "SUSE_SU-2019-2872-1.NASL", "SUSE_SU-2019-3059-1.NASL", "SUSE_SU-2019-3064-1.NASL", "SUSE_SU-2019-3092-1.NASL", "SUSE_SU-2019-3267-1.NASL", "SUSE_SU-2019-3293-1.NASL", "SUSE_SU-2019-3307-1.NASL", "SUSE_SU-2019-3308-1.NASL", "SUSE_SU-2019-3392-1.NASL", "SUSE_SU-2020-0114-1.NASL", "SUSE_SU-2020-0129-1.NASL", "SUSE_SU-2020-0130-1.NASL", "SUSE_SU-2020-0131-1.NASL", "SUSE_SU-2020-0139-1.NASL", "SUSE_SU-2020-0234-1.NASL", "SUSE_SU-2020-0302-1.NASL", "SUSE_SU-2020-0467-1.NASL", "SUSE_SU-2020-0510-1.NASL", "SUSE_SU-2020-0557-1.NASL", "SUSE_SU-2020-0854-1.NASL", "SUSE_SU-2020-0967-1.NASL", "SUSE_SU-2020-0968-1.NASL", "SUSE_SU-2020-1299-1.NASL", "SUSE_SU-2020-14306-1.NASL", "SUSE_SU-2020-14409-1.NASL", "SUSE_SU-2020-14481-1.NASL", "SUSE_SU-2020-14550-1.NASL", "SUSE_SU-2020-14579-1.NASL", "SUSE_SU-2020-14585-1.NASL", "SUSE_SU-2020-1524-1.NASL", "SUSE_SU-2020-1532-1.NASL", "SUSE_SU-2020-1532-2.NASL", "SUSE_SU-2020-1568-1.NASL", "SUSE_SU-2020-1575-1.NASL", "SUSE_SU-2020-1576-1.NASL", "SUSE_SU-2020-1584-1.NASL", "SUSE_SU-2020-1606-1.NASL", "SUSE_SU-2020-1732-1.NASL", "SUSE_SU-2020-1733-1.NASL", "SUSE_SU-2020-1734-1.NASL", "SUSE_SU-2020-1735-1.NASL", "SUSE_SU-2020-1773-1.NASL", "SUSE_SU-2020-2216-1.NASL", "SUSE_SU-2020-2275-1.NASL", "SUSE_SU-2020-2276-1.NASL", "SUSE_SU-2020-2277-1.NASL", "SUSE_SU-2020-2444-1.NASL", "SUSE_SU-2020-2445-1.NASL", "SUSE_SU-2020-2446-1.NASL", "SUSE_SU-2020-2609-1.NASL", "SUSE_SU-2020-2612-1.NASL", "SUSE_SU-2020-2699-1.NASL", "SUSE_SU-2020-2800-1.NASL", "SUSE_SU-2020-2864-1.NASL", "SUSE_SU-2020-2864-2.NASL", "SUSE_SU-2020-2988-1.NASL", "SUSE_SU-2020-3115-1.NASL", "SUSE_SU-2020-3121-1.NASL", "SUSE_SU-2020-3262-1.NASL", "SUSE_SU-2020-3375-1.NASL", "SUSE_SU-2020-3377-1.NASL", "SUSE_SU-2020-3379-1.NASL", "SUSE_SU-2020-3563-1.NASL", "SUSE_SU-2020-3593-1.NASL", "SUSE_SU-2020-3596-1.NASL", "SUSE_SU-2020-3597-1.NASL", "SUSE_SU-2020-3733-1.NASL", "SUSE_SU-2020-3735-1.NASL", "SUSE_SU-2020-3739-1.NASL", "SUSE_SU-2020-3765-1.NASL", "SUSE_SU-2020-3864-1.NASL", "SUSE_SU-2020-3865-1.NASL", "SUSE_SU-2020-3867-1.NASL", "SUSE_SU-2020-3930-1.NASL", "SUSE_SU-2020-3939-1.NASL", "SUSE_SU-2021-0225-1.NASL", "SUSE_SU-2021-0226-1.NASL", "SUSE_SU-2021-0227-1.NASL", "SUSE_SU-2021-0232-1.NASL", "SUSE_SU-2021-0344-1.NASL", "SUSE_SU-2021-0355-1.NASL", "SUSE_SU-2021-0428-1.NASL", "SUSE_SU-2021-0432-1.NASL", "SUSE_SU-2021-0529-1.NASL", "SUSE_SU-2021-0608-1.NASL", "SUSE_SU-2021-0653-1.NASL", "SUSE_SU-2021-0768-1.NASL", "SUSE_SU-2021-0794-1.NASL", "SUSE_SU-2021-0886-1.NASL", "SUSE_SU-2021-0887-1.NASL", "SUSE_SU-2021-0930-1.NASL", "SUSE_SU-2021-0931-1.NASL", "SUSE_SU-2021-0932-1.NASL", "SUSE_SU-2021-0947-1.NASL", "SUSE_SU-2021-0954-1.NASL", "SUSE_SU-2021-0955-1.NASL", "SUSE_SU-2021-0955-2.NASL", "SUSE_SU-2021-1165-1.NASL", "SUSE_SU-2021-1399-1.NASL", "SUSE_SU-2021-1412-1.NASL", "SUSE_SU-2021-14729-1.NASL", "SUSE_SU-2021-1523-1.NASL", "SUSE_SU-2021-1524-1.NASL", "SUSE_SU-2021-1621-1.NASL", "SUSE_SU-2021-1647-1.NASL", "SUSE_SU-2021-1654-1.NASL", "SUSE_SU-2021-1658-1.NASL", "SUSE_SU-2021-1786-1.NASL", "SUSE_SU-2021-1825-1.NASL", "SUSE_SU-2021-1917-1.NASL", "SUSE_SU-2021-1990-1.NASL", "SUSE_SU-2021-2012-1.NASL", "SUSE_SU-2021-2016-1.NASL", "SUSE_SU-2021-2145-1.NASL", "SUSE_SU-2021-2180-1.NASL", "SUSE_SU-2021-2320-1.NASL", "SUSE_SU-2021-2323-1.NASL", "SUSE_SU-2021-2326-1.NASL", "SUSE_SU-2021-2327-1.NASL", "SUSE_SU-2021-2353-1.NASL", "SUSE_SU-2021-2480-1.NASL", "SUSE_SU-2021-2564-1.NASL", "SUSE_SU-2021-2636-1.NASL", "SUSE_SU-2021-2637-1.NASL", "SUSE_SU-2021-2638-1.NASL", "SUSE_SU-2021-2682-1.NASL", "SUSE_SU-2021-2795-1.NASL", "SUSE_SU-2021-2817-1.NASL", "SUSE_SU-2021-3215-1.NASL", "SUSE_SU-2021-3251-1.NASL", "SUSE_SU-2021-3444-1.NASL", "SUSE_SU-2021-3529-1.NASL", "SUSE_SU-2021-3652-1.NASL", "SUSE_SU-2021-3722-1.NASL", "SUSE_SU-2021-3830-1.NASL", "SUSE_SU-2021-3942-1.NASL", "SUSE_SU-2021-4154-1.NASL", "SUSE_SU-2022-0142-1.NASL", "SUSE_SU-2022-0182-1.NASL", "SUSE_SU-2022-0182-2.NASL", "SUSE_SU-2022-0183-1.NASL", "SUSE_SU-2022-0323-1.NASL", "SUSE_SU-2022-1454-1.NASL", "SUSE_SU-2022-2405-1.NASL", "SUSE_SU-2022-2649-1.NASL", "SUSE_SU-2022-2871-1.NASL", "SUSE_SU-2022-2886-1.NASL", "SUSE_SU-2022-3549-1.NASL", "SUSE_SU-2022-3939-1.NASL", "SUSE_SU-2022-4214-1.NASL", "SUSE_SU-2022-4281-1.NASL", "SUSE_SU-2022-4289-1.NASL", "SUSE_SU-2023-0516-2.NASL", "SUSE_SU-2023-2048-1.NASL", "TENABLE_NESSUS_AGENT_TNS_2021_08.NASL", "TENABLE_OT_SIEMENS_CVE-2021-3449.NASL", "UBUNTU_USN-3853-1.NASL", "UBUNTU_USN-3859-1.NASL", "UBUNTU_USN-3938-1.NASL", "UBUNTU_USN-4040-1.NASL", "UBUNTU_USN-4049-1.NASL", "UBUNTU_USN-4132-1.NASL", "UBUNTU_USN-4151-1.NASL", "UBUNTU_USN-4165-1.NASL", "UBUNTU_USN-4176-1.NASL", "UBUNTU_USN-4202-2.NASL", "UBUNTU_USN-4219-1.NASL", "UBUNTU_USN-4236-1.NASL", "UBUNTU_USN-4236-2.NASL", "UBUNTU_USN-4256-1.NASL", "UBUNTU_USN-4274-1.NASL", "UBUNTU_USN-4293-1.NASL", "UBUNTU_USN-4327-1.NASL", "UBUNTU_USN-4333-1.NASL", "UBUNTU_USN-4333-2.NASL", "UBUNTU_USN-4335-1.NASL", "UBUNTU_USN-4384-1.NASL", "UBUNTU_USN-4394-1.NASL", "UBUNTU_USN-4402-1.NASL", "UBUNTU_USN-4416-1.NASL", "UBUNTU_USN-4428-1.NASL", "UBUNTU_USN-4438-1.NASL", "UBUNTU_USN-4466-1.NASL", "UBUNTU_USN-4491-1.NASL", "UBUNTU_USN-4568-1.NASL", "UBUNTU_USN-4570-1.NASL", "UBUNTU_USN-4581-1.NASL", "UBUNTU_USN-4601-1.NASL", "UBUNTU_USN-4635-1.NASL", "UBUNTU_USN-4648-1.NASL", "UBUNTU_USN-4665-1.NASL", "UBUNTU_USN-4677-1.NASL", "UBUNTU_USN-4705-1.NASL", "UBUNTU_USN-4742-1.NASL", "UBUNTU_USN-4754-1.NASL", "UBUNTU_USN-4754-3.NASL", "UBUNTU_USN-4891-1.NASL", "UBUNTU_USN-4906-1.NASL", "UBUNTU_USN-4968-1.NASL", "UBUNTU_USN-4968-2.NASL", "UBUNTU_USN-4991-1.NASL", "UBUNTU_USN-5038-1.NASL", "UBUNTU_USN-5200-1.NASL", "UBUNTU_USN-5310-1.NASL", "UBUNTU_USN-5380-1.NASL", "UBUNTU_USN-5425-1.NASL", "UBUNTU_USN-5431-1.NASL", "UBUNTU_USN-5699-1.NASL", "UBUNTU_USN-5768-1.NASL", "UBUNTU_USN-5812-1.NASL", "UBUNTU_USN-6142-1.NASL", "VIRTUOZZO_VZLSA-2020-5002.NASL", "VIRTUOZZO_VZLSA-2020-5012.NASL"]}, {"type": "nodejsblog", "idList": ["NODEJSBLOG:APRIL-2021-SECURITY-RELEASES", "NODEJSBLOG:JUNE-2020-SECURITY-RELEASES"]}, {"type": "openssl", "idList": ["OPENSSL:CVE-2021-3449", "OPENSSL:CVE-2021-3450"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310113637", "OPENVAS:1361412562310113638", "OPENVAS:1361412562310113639", "OPENVAS:1361412562310113722", "OPENVAS:1361412562310113723", "OPENVAS:1361412562310113724", "OPENVAS:1361412562310144089", "OPENVAS:1361412562310704360", "OPENVAS:1361412562310704428", "OPENVAS:1361412562310704472", "OPENVAS:1361412562310704530", "OPENVAS:1361412562310704549", "OPENVAS:1361412562310704571", "OPENVAS:1361412562310704591", "OPENVAS:1361412562310704696", "OPENVAS:1361412562310704697", "OPENVAS:1361412562310815550", "OPENVAS:1361412562310815712", "OPENVAS:1361412562310815713", "OPENVAS:1361412562310815714", "OPENVAS:1361412562310815715", "OPENVAS:1361412562310815813", "OPENVAS:1361412562310815814", "OPENVAS:1361412562310815815", "OPENVAS:1361412562310815816", "OPENVAS:1361412562310815817", "OPENVAS:1361412562310843866", "OPENVAS:1361412562310843871", "OPENVAS:1361412562310843968", "OPENVAS:1361412562310844072", "OPENVAS:1361412562310844081", "OPENVAS:1361412562310844176", "OPENVAS:1361412562310844197", "OPENVAS:1361412562310844211", "OPENVAS:1361412562310844226", "OPENVAS:1361412562310844268", "OPENVAS:1361412562310844269", "OPENVAS:1361412562310844291", "OPENVAS:1361412562310844294", "OPENVAS:1361412562310844313", "OPENVAS:1361412562310844335", "OPENVAS:1361412562310844355", "OPENVAS:1361412562310844391", "OPENVAS:1361412562310844398", "OPENVAS:1361412562310844399", "OPENVAS:1361412562310844416", "OPENVAS:1361412562310844459", "OPENVAS:1361412562310844467", "OPENVAS:1361412562310844476", "OPENVAS:1361412562310844490", "OPENVAS:1361412562310852113", "OPENVAS:1361412562310852119", "OPENVAS:1361412562310852232", "OPENVAS:1361412562310852518", "OPENVAS:1361412562310852617", "OPENVAS:1361412562310852631", "OPENVAS:1361412562310852663", "OPENVAS:1361412562310852707", "OPENVAS:1361412562310852716", "OPENVAS:1361412562310852752", "OPENVAS:1361412562310852759", "OPENVAS:1361412562310852761", "OPENVAS:1361412562310852762", "OPENVAS:1361412562310852765", "OPENVAS:1361412562310852790", "OPENVAS:1361412562310852807", "OPENVAS:1361412562310852836", "OPENVAS:1361412562310852850", "OPENVAS:1361412562310852877", "OPENVAS:1361412562310852894", "OPENVAS:1361412562310852941", "OPENVAS:1361412562310852945", "OPENVAS:1361412562310852981", "OPENVAS:1361412562310852993", "OPENVAS:1361412562310853008", "OPENVAS:1361412562310853055", "OPENVAS:1361412562310853111", "OPENVAS:1361412562310853172", "OPENVAS:1361412562310853196", "OPENVAS:1361412562310853201", "OPENVAS:1361412562310853207", "OPENVAS:1361412562310853235", "OPENVAS:1361412562310853240", "OPENVAS:1361412562310853252", "OPENVAS:1361412562310853256", "OPENVAS:1361412562310875306", "OPENVAS:1361412562310875425", "OPENVAS:1361412562310875610", "OPENVAS:1361412562310876261", "OPENVAS:1361412562310876566", "OPENVAS:1361412562310876577", "OPENVAS:1361412562310876588", "OPENVAS:1361412562310876640", "OPENVAS:1361412562310876844", "OPENVAS:1361412562310876875", "OPENVAS:1361412562310876971", "OPENVAS:1361412562310876973", "OPENVAS:1361412562310876974", "OPENVAS:1361412562310876975", "OPENVAS:1361412562310876976", "OPENVAS:1361412562310876978", "OPENVAS:1361412562310877107", "OPENVAS:1361412562310877114", "OPENVAS:1361412562310877137", "OPENVAS:1361412562310877183", "OPENVAS:1361412562310877282", "OPENVAS:1361412562310877303", "OPENVAS:1361412562310877343", "OPENVAS:1361412562310877346", "OPENVAS:1361412562310877472", "OPENVAS:1361412562310877602", "OPENVAS:1361412562310877653", "OPENVAS:1361412562310877666", "OPENVAS:1361412562310877701", "OPENVAS:1361412562310877732", "OPENVAS:1361412562310877744", "OPENVAS:1361412562310877770", "OPENVAS:1361412562310877872", "OPENVAS:1361412562310877895", "OPENVAS:1361412562310877945", "OPENVAS:1361412562310877950", "OPENVAS:1361412562310877954", "OPENVAS:1361412562310877976", "OPENVAS:1361412562310877992", "OPENVAS:1361412562310877993", "OPENVAS:1361412562310878012", "OPENVAS:1361412562310878038", "OPENVAS:1361412562310883126", "OPENVAS:1361412562310883132", "OPENVAS:1361412562310891600", "OPENVAS:1361412562310891762", "OPENVAS:1361412562310891839", "OPENVAS:1361412562310891866", "OPENVAS:1361412562310891912", "OPENVAS:1361412562310891931", "OPENVAS:1361412562310891981", "OPENVAS:1361412562310891987", "OPENVAS:1361412562310891997", "OPENVAS:1361412562310892038", "OPENVAS:1361412562310892044", "OPENVAS:1361412562310892048", "OPENVAS:1361412562310892088", "OPENVAS:1361412562310892221", "OPENVAS:1361412562310892280", "OPENVAS:1361412562311220191111", "OPENVAS:1361412562311220191135", "OPENVAS:1361412562311220191260", "OPENVAS:1361412562311220191344", "OPENVAS:1361412562311220191552", "OPENVAS:1361412562311220191599", "OPENVAS:1361412562311220191648", "OPENVAS:1361412562311220191661", "OPENVAS:1361412562311220191703", "OPENVAS:1361412562311220191758", "OPENVAS:1361412562311220191783", "OPENVAS:1361412562311220191808", "OPENVAS:1361412562311220191841", "OPENVAS:1361412562311220191894", "OPENVAS:1361412562311220191923", "OPENVAS:1361412562311220191927", "OPENVAS:1361412562311220191935", "OPENVAS:1361412562311220191973", "OPENVAS:1361412562311220192014", "OPENVAS:1361412562311220192030", "OPENVAS:1361412562311220192063", "OPENVAS:1361412562311220192077", "OPENVAS:1361412562311220192103", "OPENVAS:1361412562311220192107", "OPENVAS:1361412562311220192114", "OPENVAS:1361412562311220192115", "OPENVAS:1361412562311220192145", "OPENVAS:1361412562311220192225", "OPENVAS:1361412562311220192256", "OPENVAS:1361412562311220192349", "OPENVAS:1361412562311220192379", "OPENVAS:1361412562311220192433", "OPENVAS:1361412562311220192442", "OPENVAS:1361412562311220192653", "OPENVAS:1361412562311220192687", "OPENVAS:1361412562311220201002", "OPENVAS:1361412562311220201044", "OPENVAS:1361412562311220201048", "OPENVAS:1361412562311220201056", "OPENVAS:1361412562311220201075", "OPENVAS:1361412562311220201085", "OPENVAS:1361412562311220201117", "OPENVAS:1361412562311220201140", "OPENVAS:1361412562311220201145", "OPENVAS:1361412562311220201153", "OPENVAS:1361412562311220201159", "OPENVAS:1361412562311220201164", "OPENVAS:1361412562311220201165", "OPENVAS:1361412562311220201212", "OPENVAS:1361412562311220201217", "OPENVAS:1361412562311220201226", "OPENVAS:1361412562311220201275", "OPENVAS:1361412562311220201295", "OPENVAS:1361412562311220201296", "OPENVAS:1361412562311220201303", "OPENVAS:1361412562311220201310", "OPENVAS:1361412562311220201321", "OPENVAS:1361412562311220201332", "OPENVAS:1361412562311220201336", "OPENVAS:1361412562311220201343", "OPENVAS:1361412562311220201344", "OPENVAS:1361412562311220201346", "OPENVAS:1361412562311220201358", "OPENVAS:1361412562311220201362", "OPENVAS:1361412562311220201375", "OPENVAS:1361412562311220201377", "OPENVAS:1361412562311220201387", "OPENVAS:1361412562311220201405", "OPENVAS:1361412562311220201408", "OPENVAS:1361412562311220201427", "OPENVAS:1361412562311220201434", "OPENVAS:1361412562311220201445", "OPENVAS:1361412562311220201456", "OPENVAS:1361412562311220201472", "OPENVAS:1361412562311220201474", "OPENVAS:1361412562311220201488", "OPENVAS:1361412562311220201509", "OPENVAS:1361412562311220201510", "OPENVAS:1361412562311220201516", "OPENVAS:1361412562311220201522", "OPENVAS:1361412562311220201533", "OPENVAS:1361412562311220201560", "OPENVAS:1361412562311220201569", "OPENVAS:1361412562311220201607", "OPENVAS:1361412562311220201630", "OPENVAS:1361412562311220201631", "OPENVAS:1361412562311220201646", "OPENVAS:1361412562311220201654", "OPENVAS:1361412562311220201670", "OPENVAS:1361412562311220201699", "OPENVAS:1361412562311220201702", "OPENVAS:1361412562311220201716", "OPENVAS:1361412562311220201737", "OPENVAS:1361412562311220201768", "OPENVAS:1361412562311220201779"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2019", "ORACLE:CPUAPR2020", "ORACLE:CPUAPR2021", "ORACLE:CPUAPR2022", "ORACLE:CPUAPR2023", "ORACLE:CPUJAN2021", "ORACLE:CPUJAN2022", "ORACLE:CPUJUL2020", "ORACLE:CPUJUL2021", "ORACLE:CPUJUL2022", "ORACLE:CPUOCT2020", "ORACLE:CPUOCT2021", "ORACLE:CPUOCT2022"]}, {"type": "oraclelinux", "idList": ["ELSA-2019-3210", "ELSA-2019-3237", "ELSA-2020-2637", "ELSA-2020-2755", "ELSA-2020-2848", "ELSA-2020-2852", "ELSA-2020-3658", "ELSA-2020-3662", "ELSA-2020-3888", "ELSA-2020-3908", "ELSA-2020-3911", "ELSA-2020-3952", "ELSA-2020-3996", "ELSA-2020-4432", "ELSA-2020-4433", "ELSA-2020-4443", "ELSA-2020-4479", "ELSA-2020-4482", "ELSA-2020-4484", "ELSA-2020-4490", "ELSA-2020-4497", "ELSA-2020-4508", "ELSA-2020-4539", "ELSA-2020-4545", "ELSA-2020-4599", "ELSA-2020-4641", "ELSA-2020-4654", "ELSA-2020-5002", "ELSA-2020-5009", "ELSA-2020-5010", "ELSA-2020-5012", "ELSA-2020-5483", "ELSA-2020-5765", "ELSA-2021-0348", "ELSA-2021-1024", "ELSA-2021-1145", "ELSA-2021-1206", "ELSA-2021-1581", "ELSA-2021-1582", "ELSA-2021-1585", "ELSA-2021-1586", "ELSA-2021-1593", "ELSA-2021-1597", "ELSA-2021-1609", "ELSA-2021-1610", "ELSA-2021-1611", "ELSA-2021-1633", "ELSA-2021-1675", "ELSA-2021-1679", "ELSA-2021-1702", "ELSA-2021-1723", "ELSA-2021-1761", "ELSA-2021-1879", "ELSA-2021-2569", "ELSA-2021-2574", "ELSA-2021-2575", "ELSA-2021-4151", "ELSA-2021-4160", "ELSA-2021-4162", "ELSA-2021-4785", "ELSA-2021-9151", "ELSA-2021-9280", "ELSA-2021-9294", "ELSA-2021-9344", "ELSA-2022-0827", "ELSA-2022-0830", "ELSA-2022-5234", "ELSA-2022-5235", "ELSA-2022-9204"]}, {"type": "osv", "idList": ["OSV:ASB-A-192605364", "OSV:CVE-2019-14889", "OSV:CVE-2019-16935", "OSV:CVE-2019-20907", "OSV:CVE-2020-13434", "OSV:CVE-2020-13777", "OSV:CVE-2020-14422", "OSV:CVE-2020-1730", "OSV:CVE-2020-24659", "OSV:CVE-2020-26137", "OSV:CVE-2020-8492", "OSV:CVE-2021-23239", "OSV:CVE-2021-3520", "OSV:DLA-1600-1", "OSV:DLA-1762-1", "OSV:DLA-1762-2", "OSV:DLA-1839-1", "OSV:DLA-1866-1", "OSV:DLA-1866-2", "OSV:DLA-1912-1", "OSV:DLA-1931-1", "OSV:DLA-1931-2", "OSV:DLA-1981-1", "OSV:DLA-1987-1", "OSV:DLA-1997-1", "OSV:DLA-2038-1", "OSV:DLA-2044-1", "OSV:DLA-2048-1", "OSV:DLA-2088-1", "OSV:DLA-2221-1", "OSV:DLA-2280-1", "OSV:DLA-2295-1", "OSV:DLA-2337-1", "OSV:DLA-2340-1", "OSV:DLA-2340-2", "OSV:DLA-2369-1", "OSV:DLA-2370-1", "OSV:DLA-2382-1", "OSV:DLA-2437-1", "OSV:DLA-2456-1", "OSV:DLA-2476-1", "OSV:DLA-2500-1", "OSV:DLA-2513-1", "OSV:DLA-2569-1", "OSV:DLA-2619-1", "OSV:DLA-2628-1", "OSV:DLA-2653-1", "OSV:DLA-2657-1", "OSV:DLA-2669-1", "OSV:DLA-2751-1", "OSV:DLA-2760-1", "OSV:DLA-2786-1", "OSV:DLA-2987-1", "OSV:DLA-3152-1", "OSV:DLA-3164-1", "OSV:DLA-3181-1", "OSV:DLA-3202-1", "OSV:DLA-3205-1", "OSV:DLA-3363-1", "OSV:DLA-3424-1", "OSV:DLA-3432-1", "OSV:DLA-3437-1", "OSV:DLA-3445-1", "OSV:DSA-4360-1", "OSV:DSA-4428-1", "OSV:DSA-4472-1", "OSV:DSA-4530-1", "OSV:DSA-4549-1", "OSV:DSA-4571-1", "OSV:DSA-4591-1", "OSV:DSA-4696-1", "OSV:DSA-4697-1", "OSV:DSA-4795-1", "OSV:DSA-4797-1", "OSV:DSA-4797-2", "OSV:DSA-4801-1", "OSV:DSA-4822-1", "OSV:DSA-4875-1", "OSV:DSA-4881-1", "OSV:DSA-4919-1", "OSV:DSA-4933-1", "OSV:GHSA-3XXV-P78R-4FC6", "OSV:GHSA-5V8V-66V8-MWM7", "OSV:GHSA-7553-JR98-VX47", "OSV:GHSA-7RRM-V45F-JP64", "OSV:GHSA-83MX-573X-5RW9", "OSV:GHSA-8HFJ-XRJ2-PM22", "OSV:GHSA-9Q5J-JM53-V7VR", "OSV:GHSA-GPVV-69J7-GWJ8", "OSV:GHSA-Q2Q7-5PP4-W6PG", "OSV:GHSA-WQVQ-5M8C-6G24", "OSV:PYSEC-2020-148", "OSV:PYSEC-2020-173", "OSV:PYSEC-2020-29", "OSV:PYSEC-2021-108", "OSV:PYSEC-2021-4", "OSV:RUSTSEC-2021-0055", "OSV:RUSTSEC-2021-0056", "OSV:RUSTSEC-2021-0131", "OSV:RUSTSEC-2021-0132", "OSV:RUSTSEC-2022-0051"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:152610", "PACKETSTORM:155498"]}, {"type": "paloalto", "idList": ["PA-CVE-2020-27619"]}, {"type": "photon", "idList": ["PHSA-2019-0006", "PHSA-2019-0012", "PHSA-2019-0024", "PHSA-2019-0026", "PHSA-2019-0035", "PHSA-2019-0036", "PHSA-2019-0140", "PHSA-2019-0149", "PHSA-2019-0153", "PHSA-2019-0171", "PHSA-2019-0182", "PHSA-2019-0215", "PHSA-2019-0228", "PHSA-2019-0237", "PHSA-2019-0245", "PHSA-2019-0246", "PHSA-2019-0247", "PHSA-2019-0255", "PHSA-2019-1.0-0215", "PHSA-2019-1.0-0228", "PHSA-2019-1.0-0237", "PHSA-2019-1.0-0245", "PHSA-2019-1.0-0246", "PHSA-2019-1.0-0247", "PHSA-2019-1.0-0255", "PHSA-2019-2.0-0140", "PHSA-2019-2.0-0153", "PHSA-2019-2.0-0171", "PHSA-2019-2.0-0182", "PHSA-2019-3.0-0005", "PHSA-2019-3.0-0006", "PHSA-2019-3.0-0012", "PHSA-2019-3.0-0024", "PHSA-2019-3.0-0026", "PHSA-2019-3.0-0035", "PHSA-2019-3.0-0036", "PHSA-2020-0053", "PHSA-2020-0055", "PHSA-2020-0057", "PHSA-2020-0067", "PHSA-2020-0077", "PHSA-2020-0078", "PHSA-2020-0101", "PHSA-2020-0103", "PHSA-2020-0105", "PHSA-2020-0106", "PHSA-2020-0111", "PHSA-2020-0113", "PHSA-2020-0118", "PHSA-2020-0129", "PHSA-2020-0142", "PHSA-2020-0146", "PHSA-2020-0155", "PHSA-2020-0161", "PHSA-2020-0164", "PHSA-2020-0174", "PHSA-2020-0202", "PHSA-2020-0203", "PHSA-2020-0205", "PHSA-2020-0207", "PHSA-2020-0208", "PHSA-2020-0216", "PHSA-2020-0225", "PHSA-2020-0226", "PHSA-2020-0227", "PHSA-2020-0249", "PHSA-2020-0252", "PHSA-2020-0254", "PHSA-2020-0255", "PHSA-2020-0258", "PHSA-2020-0261", "PHSA-2020-0272", "PHSA-2020-0273", "PHSA-2020-0283", "PHSA-2020-0288", "PHSA-2020-0298", "PHSA-2020-0301", "PHSA-2020-0304", "PHSA-2020-0308", "PHSA-2020-0309", "PHSA-2020-0315", "PHSA-2020-0325", "PHSA-2020-0330", "PHSA-2020-0332", "PHSA-2020-0338", "PHSA-2020-0346", "PHSA-2020-1.0-0267", "PHSA-2020-1.0-0271", "PHSA-2020-1.0-0272", "PHSA-2020-1.0-0273", "PHSA-2020-1.0-0277", "PHSA-2020-1.0-0283", "PHSA-2020-1.0-0288", "PHSA-2020-1.0-0298", "PHSA-2020-1.0-0301", "PHSA-2020-1.0-0304", "PHSA-2020-1.0-0308", "PHSA-2020-1.0-0309", "PHSA-2020-1.0-0315", "PHSA-2020-1.0-0325", "PHSA-2020-1.0-0330", "PHSA-2020-1.0-0332", "PHSA-2020-1.0-0338", "PHSA-2020-1.0-0346", "PHSA-2020-2.0-0202", "PHSA-2020-2.0-0203", "PHSA-2020-2.0-0205", "PHSA-2020-2.0-0207", "PHSA-2020-2.0-0208", "PHSA-2020-2.0-0216", "PHSA-2020-2.0-0225", "PHSA-2020-2.0-0226", "PHSA-2020-2.0-0227", "PHSA-2020-2.0-0249", "PHSA-2020-2.0-0252", "PHSA-2020-2.0-0254", "PHSA-2020-2.0-0255", "PHSA-2020-2.0-0258", "PHSA-2020-2.0-0261", "PHSA-2020-2.0-0265", "PHSA-2020-2.0-0273", "PHSA-2020-2.0-0285", "PHSA-2020-2.0-0288", "PHSA-2020-2.0-0289", "PHSA-2020-2.0-0295", "PHSA-2020-2.0-0304", "PHSA-2020-3.0-0053", "PHSA-2020-3.0-0055", "PHSA-2020-3.0-0057", "PHSA-2020-3.0-0067", "PHSA-2020-3.0-0077", "PHSA-2020-3.0-0078", "PHSA-2020-3.0-0101", "PHSA-2020-3.0-0103", "PHSA-2020-3.0-0105", "PHSA-2020-3.0-0106", "PHSA-2020-3.0-0111", "PHSA-2020-3.0-0113", "PHSA-2020-3.0-0118", "PHSA-2020-3.0-0129", "PHSA-2020-3.0-0142", "PHSA-2020-3.0-0146", "PHSA-2020-3.0-0155", "PHSA-2020-3.0-0161", "PHSA-2020-3.0-0164", "PHSA-2020-3.0-0174", "PHSA-2021-0005", "PHSA-2021-0007", "PHSA-2021-0008", "PHSA-2021-0012", "PHSA-2021-0047", "PHSA-2021-0052", "PHSA-2021-0060", "PHSA-2021-0186", "PHSA-2021-0189", "PHSA-2021-0193", "PHSA-2021-0197", "PHSA-2021-0204", "PHSA-2021-0210", "PHSA-2021-0214", "PHSA-2021-0221", "PHSA-2021-0223", "PHSA-2021-0255", "PHSA-2021-0266", "PHSA-2021-0313", "PHSA-2021-0315", "PHSA-2021-0320", "PHSA-2021-0327", "PHSA-2021-0329", "PHSA-2021-0331", "PHSA-2021-0338", "PHSA-2021-0339", "PHSA-2021-0354", "PHSA-2021-0356", "PHSA-2021-0360", "PHSA-2021-0371", "PHSA-2021-0383", "PHSA-2021-0442", "PHSA-2021-0455", "PHSA-2021-1.0-0354", "PHSA-2021-1.0-0356", "PHSA-2021-1.0-0360", "PHSA-2021-1.0-0371", "PHSA-2021-1.0-0383", "PHSA-2021-2.0-0313", "PHSA-2021-2.0-0315", "PHSA-2021-2.0-0320", "PHSA-2021-2.0-0323", "PHSA-2021-2.0-0327", "PHSA-2021-2.0-0329", "PHSA-2021-2.0-0331", "PHSA-2021-2.0-0338", "PHSA-2021-2.0-0339", "PHSA-2021-2.0-0357", "PHSA-2021-2.0-0393", "PHSA-2021-3.0-0186", "PHSA-2021-3.0-0189", "PHSA-2021-3.0-0193", "PHSA-2021-3.0-0194", "PHSA-2021-3.0-0197", "PHSA-2021-3.0-0204", "PHSA-2021-3.0-0210", "PHSA-2021-3.0-0214", "PHSA-2021-3.0-0221", "PHSA-2021-3.0-0223", "PHSA-2021-3.0-0255", "PHSA-2021-3.0-0266", "PHSA-2021-3.0-0342", "PHSA-2021-4.0-0005", "PHSA-2021-4.0-0007", "PHSA-2021-4.0-0008", "PHSA-2021-4.0-0012", "PHSA-2021-4.0-0047", "PHSA-2021-4.0-0052", "PHSA-2021-4.0-0060", "PHSA-2021-4.0-0139", "PHSA-2022-3.0-0342", "PHSA-2022-3.0-0488", "PHSA-2022-4.0-0279", "PHSA-2023-4.0-0415", "PHSA-2023-5.0-0035"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:73EAE8A2825E9B6764F314122B4E5F25", "RAPID7BLOG:C62665D003B287EB5E4FC604B7578606"]}, {"type": "redhat", "idList": ["RHSA-2019:3193", "RHSA-2019:3196", "RHSA-2019:3210", "RHSA-2019:3237", "RHSA-2019:3756", "RHSA-2020:1605", "RHSA-2020:2523", "RHSA-2020:2524", "RHSA-2020:2637", "RHSA-2020:2638", "RHSA-2020:2639", "RHSA-2020:2644", "RHSA-2020:2646", "RHSA-2020:2755", "RHSA-2020:2784", "RHSA-2020:2823", "RHSA-2020:2847", "RHSA-2020:2848", "RHSA-2020:2849", "RHSA-2020:2850", "RHSA-2020:2852", "RHSA-2020:2895", "RHSA-2020:3042", "RHSA-2020:3084", "RHSA-2020:3194", "RHSA-2020:3372", "RHSA-2020:3525", "RHSA-2020:3578", "RHSA-2020:3658", "RHSA-2020:3662", "RHSA-2020:3749", "RHSA-2020:3756", "RHSA-2020:3888", "RHSA-2020:3908", "RHSA-2020:3911", "RHSA-2020:3952", "RHSA-2020:3996", "RHSA-2020:4201", "RHSA-2020:4254", "RHSA-2020:4255", "RHSA-2020:4264", "RHSA-2020:4273", "RHSA-2020:4285", "RHSA-2020:4299", "RHSA-2020:4432", "RHSA-2020:4433", "RHSA-2020:4443", "RHSA-2020:4479", "RHSA-2020:4482", "RHSA-2020:4484", "RHSA-2020:4490", "RHSA-2020:4497", "RHSA-2020:4508", "RHSA-2020:4539", "RHSA-2020:4545", "RHSA-2020:4599", "RHSA-2020:4641", "RHSA-2020:4654", "RHSA-2020:4846", "RHSA-2020:5002", "RHSA-2020:5009", "RHSA-2020:5010", "RHSA-2020:5012", "RHSA-2020:5118", "RHSA-2020:5149", "RHSA-2020:5218", "RHSA-2020:5359", "RHSA-2020:5364", "RHSA-2020:5417", "RHSA-2020:5483", "RHSA-2020:5605", "RHSA-2020:5614", "RHSA-2020:5633", "RHSA-2020:5635", "RHSA-2021:0037", "RHSA-2021:0039", "RHSA-2021:0050", "RHSA-2021:0083", "RHSA-2021:0146", "RHSA-2021:0187", "RHSA-2021:0190", "RHSA-2021:0348", "RHSA-2021:0436", "RHSA-2021:0528", "RHSA-2021:0607", "RHSA-2021:0719", "RHSA-2021:0761", "RHSA-2021:0778", "RHSA-2021:0799", "RHSA-2021:0881", "RHSA-2021:0949", "RHSA-2021:1024", "RHSA-2021:1063", "RHSA-2021:1079", "RHSA-2021:1129", "RHSA-2021:1131", "RHSA-2021:1145", "RHSA-2021:1168", "RHSA-2021:1189", "RHSA-2021:1195", "RHSA-2021:1196", "RHSA-2021:1199", "RHSA-2021:1200", "RHSA-2021:1202", "RHSA-2021:1203", "RHSA-2021:1206", "RHSA-2021:1225", "RHSA-2021:1230", "RHSA-2021:1245", "RHSA-2021:1246", "RHSA-2021:1338", "RHSA-2021:1369", "RHSA-2021:1429", "RHSA-2021:1448", "RHSA-2021:1499", "RHSA-2021:1581", "RHSA-2021:1582", "RHSA-2021:1585", "RHSA-2021:1586", "RHSA-2021:1593", "RHSA-2021:1597", "RHSA-2021:1609", "RHSA-2021:1610", "RHSA-2021:1611", "RHSA-2021:1633", "RHSA-2021:1675", "RHSA-2021:1679", "RHSA-2021:1702", "RHSA-2021:1723", "RHSA-2021:1761", "RHSA-2021:1879", "RHSA-2021:1968", "RHSA-2021:2021", "RHSA-2021:2041", "RHSA-2021:2053", "RHSA-2021:2121", "RHSA-2021:2130", "RHSA-2021:2136", "RHSA-2021:2239", "RHSA-2021:2280", "RHSA-2021:2356", "RHSA-2021:2438", "RHSA-2021:2461", "RHSA-2021:2471", "RHSA-2021:2472", "RHSA-2021:2479", "RHSA-2021:2532", "RHSA-2021:2543", "RHSA-2021:2569", "RHSA-2021:2574", "RHSA-2021:2575", "RHSA-2021:2705", "RHSA-2021:2758", "RHSA-2021:2760", "RHSA-2021:2791", "RHSA-2021:2920", "RHSA-2021:3016", "RHSA-2021:3024", "RHSA-2021:3119", "RHSA-2021:3229", "RHSA-2021:3252", "RHSA-2021:3254", "RHSA-2021:3259", "RHSA-2021:3361", "RHSA-2021:3366", "RHSA-2021:3473", "RHSA-2021:3556", "RHSA-2021:3900", "RHSA-2021:4151", "RHSA-2021:4160", "RHSA-2021:4162", "RHSA-2021:4582", "RHSA-2021:4702", "RHSA-2021:4771", "RHSA-2021:4785", "RHSA-2021:4975", "RHSA-2021:5038", "RHSA-2022:0056", "RHSA-2022:0073", "RHSA-2022:0181", "RHSA-2022:0202", "RHSA-2022:0580", "RHSA-2022:0827", "RHSA-2022:0828", "RHSA-2022:0829", "RHSA-2022:0830", "RHSA-2022:1345", "RHSA-2022:1389", "RHSA-2022:1390", "RHSA-2022:5234", "RHSA-2022:5235", "RHSA-2022:5606", "RHSA-2022:5840", "RHSA-2022:5924", "RHSA-2022:6252", "RHSA-2022:6271", "RHSA-2022:6407"]}, {"type": "redhatcve", "idList": ["RH:CVE-2016-10228", "RH:CVE-2017-14502", "RH:CVE-2018-1000858", "RH:CVE-2018-20843", "RH:CVE-2019-13012", "RH:CVE-2019-13050", "RH:CVE-2019-13627", "RH:CVE-2019-14866", "RH:CVE-2019-14889", "RH:CVE-2019-15903", "RH:CVE-2019-16935", "RH:CVE-2019-18276", "RH:CVE-2019-19221", "RH:CVE-2019-19906", "RH:CVE-2019-19956", "RH:CVE-2019-20387", "RH:CVE-2019-20388", "RH:CVE-2019-20454", "RH:CVE-2019-20838", "RH:CVE-2019-20907", "RH:CVE-2019-20916", "RH:CVE-2019-25013", "RH:CVE-2019-2708", "RH:CVE-2019-3842", "RH:CVE-2019-9169", "RH:CVE-2020-11080", "RH:CVE-2020-13434", "RH:CVE-2020-13543", "RH:CVE-2020-13584", "RH:CVE-2020-13776", "RH:CVE-2020-13777", "RH:CVE-2020-14352", "RH:CVE-2020-14422", "RH:CVE-2020-15358", "RH:CVE-2020-1730", "RH:CVE-2020-24659", "RH:CVE-2020-24977", "RH:CVE-2020-26116", "RH:CVE-2020-27618", "RH:CVE-2020-27619", "RH:CVE-2020-28196", "RH:CVE-2020-29361", "RH:CVE-2020-29362", "RH:CVE-2020-29363", "RH:CVE-2020-7595", "RH:CVE-2020-8177", "RH:CVE-2020-8231", "RH:CVE-2020-8284", "RH:CVE-2020-8285", "RH:CVE-2020-8286", "RH:CVE-2020-8492", "RH:CVE-2020-8927", "RH:CVE-2020-9948", "RH:CVE-2020-9951", "RH:CVE-2020-9983", "RH:CVE-2021-20271", "RH:CVE-2021-20305", "RH:CVE-2021-23239", "RH:CVE-2021-23240", "RH:CVE-2021-23336", "RH:CVE-2021-3326", "RH:CVE-2021-33503", "RH:CVE-2021-3449", "RH:CVE-2021-3450", "RH:CVE-2021-3516", "RH:CVE-2021-3520", "RH:CVE-2021-3541"]}, {"type": "redos", "idList": ["ROS-20220125-01", "ROS-20230420-02", "ROS-20230619-05"]}, {"type": "rocky", "idList": ["RLEA-2021:1580", "RLSA-2020:1605", "RLSA-2020:2755", "RLSA-2020:2848", "RLSA-2020:2852", "RLSA-2020:3662", "RLSA-2020:4482", "RLSA-2020:4484", "RLSA-2020:4490", "RLSA-2020:4497", "RLSA-2020:4539", "RLSA-2020:4545", "RLSA-2020:4641", "RLSA-2020:4654", "RLSA-2020:4846", "RLSA-2021:1024", "RLSA-2021:1206", "RLSA-2021:1581", "RLSA-2021:1582", "RLSA-2021:1585", "RLSA-2021:1586", "RLSA-2021:1593", "RLSA-2021:1597", "RLSA-2021:1609", "RLSA-2021:1610", "RLSA-2021:1611", "RLSA-2021:1675", "RLSA-2021:1702", "RLSA-2021:1723", "RLSA-2021:1761", "RLSA-2021:1879", "RLSA-2021:1968", "RLSA-2021:2569", "RLSA-2021:2574", "RLSA-2021:2575", "RLSA-2021:4151", "RLSA-2021:4160", "RLSA-2021:4162", "RLSA-2022:0827", "RLSA-2022:0830"]}, {"type": "rosalinux", "idList": ["ROSA-SA-2021-1957", "ROSA-SA-2021-1975", "ROSA-SA-2021-1980", "ROSA-SA-2021-1982"]}, {"type": "rubygems", "idList": ["RUBY:NOKOGIRI-2020-7595"]}, {"type": "rustsec", "idList": ["RUSTSEC-2021-0055", "RUSTSEC-2021-0056", "RUSTSEC-2021-0131", "RUSTSEC-2021-0132", "RUSTSEC-2022-0051"]}, {"type": "seebug", "idList": ["SSV:99170"]}, {"type": "slackware", "idList": ["SSA-2019-259-01", "SSA-2019-293-01", "SSA-2019-295-01", "SSA-2020-176-01", "SSA-2020-232-01", "SSA-2020-344-01", "SSA-2020-347-01", "SSA-2021-011-01", "SSA-2021-135-01", "SSA-2021-145-01", "SSA-2022-055-01"]}, {"type": "sonarsource", "idList": ["SONARSOURCE:975650E98377379A199A2570C63A856D"]}, {"type": "sqlite", "idList": ["SQLT:CVE-2020-13434", "SQLT:CVE-2020-15358"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:3690-1", "OPENSUSE-SU-2018:3717-1", "OPENSUSE-SU-2019:0020-1", "OPENSUSE-SU-2019:1450-1", "OPENSUSE-SU-2019:1749-1", "OPENSUSE-SU-2019:1777-1", "OPENSUSE-SU-2019:1917-1", "OPENSUSE-SU-2019:2161-1", "OPENSUSE-SU-2019:2204-1", "OPENSUSE-SU-2019:2205-1", "OPENSUSE-SU-2019:2389-1", "OPENSUSE-SU-2019:2393-1", "OPENSUSE-SU-2019:2420-1", "OPENSUSE-SU-2019:2424-1", "OPENSUSE-SU-2019:2425-1", "OPENSUSE-SU-2019:2438-1", "OPENSUSE-SU-2019:2447-1", "OPENSUSE-SU-2019:2451-1", "OPENSUSE-SU-2019:2452-1", "OPENSUSE-SU-2019:2453-1", "OPENSUSE-SU-2019:2459-1", "OPENSUSE-SU-2019:2464-1", "OPENSUSE-SU-2019:2593-1", "OPENSUSE-SU-2019:2596-1", "OPENSUSE-SU-2019:2689-1", "OPENSUSE-SU-2020:0010-1", "OPENSUSE-SU-2020:0022-1", "OPENSUSE-SU-2020:0086-1", "OPENSUSE-SU-2020:0102-1", "OPENSUSE-SU-2020:0274-1", "OPENSUSE-SU-2020:0510-1", "OPENSUSE-SU-2020:0681-1", "OPENSUSE-SU-2020:0781-1", "OPENSUSE-SU-2020:0790-1", "OPENSUSE-SU-2020:0802-1", "OPENSUSE-SU-2020:0883-1", "OPENSUSE-SU-2020:0908-1", "OPENSUSE-SU-2020:0931-1", "OPENSUSE-SU-2020:0940-1", "OPENSUSE-SU-2020:0989-1", "OPENSUSE-SU-2020:1002-1", "OPENSUSE-SU-2020:1254-1", "OPENSUSE-SU-2020:1257-1", "OPENSUSE-SU-2020:1258-1", "OPENSUSE-SU-2020:1265-1", "OPENSUSE-SU-2020:1289-1", "OPENSUSE-SU-2020:1345-1", "OPENSUSE-SU-2020:1359-1", "OPENSUSE-SU-2020:1428-1", "OPENSUSE-SU-2020:1430-1", "OPENSUSE-SU-2020:1465-1", "OPENSUSE-SU-2020:1494-1", "OPENSUSE-SU-2020:1578-1", "OPENSUSE-SU-2020:1598-1", "OPENSUSE-SU-2020:1613-1", "OPENSUSE-SU-2020:1724-1", "OPENSUSE-SU-2020:1743-1", "OPENSUSE-SU-2020:1859-1", "OPENSUSE-SU-2020:1988-1", "OPENSUSE-SU-2020:2037-1", "OPENSUSE-SU-2020:2062-1", "OPENSUSE-SU-2020:2143-1", "OPENSUSE-SU-2020:2152-1", "OPENSUSE-SU-2020:2169-1", "OPENSUSE-SU-2020:2184-1", "OPENSUSE-SU-2020:2185-1", "OPENSUSE-SU-2020:2189-1", "OPENSUSE-SU-2020:2190-1", "OPENSUSE-SU-2020:2211-1", "OPENSUSE-SU-2020:2238-1", "OPENSUSE-SU-2020:2249-1", "OPENSUSE-SU-2020:2304-1", "OPENSUSE-SU-2020:2310-1", "OPENSUSE-SU-2020:2332-1", "OPENSUSE-SU-2020:2333-1", "OPENSUSE-SU-2021:0169-1", "OPENSUSE-SU-2021:0170-1", "OPENSUSE-SU-2021:0270-1", "OPENSUSE-SU-2021:0277-1", "OPENSUSE-SU-2021:0295-1", "OPENSUSE-SU-2021:0331-1", "OPENSUSE-SU-2021:0358-1", "OPENSUSE-SU-2021:0435-1", "OPENSUSE-SU-2021:0468-1", "OPENSUSE-SU-2021:0476-1", "OPENSUSE-SU-2021:0635-1", "OPENSUSE-SU-2021:0692-1", "OPENSUSE-SU-2021:0760-1", "OPENSUSE-SU-2021:0764-1", "OPENSUSE-SU-2021:0886-1", "OPENSUSE-SU-2021:1058-1", "OPENSUSE-SU-2021:1059-1", "OPENSUSE-SU-2021:1061-1", "OPENSUSE-SU-2021:1366-1", "OPENSUSE-SU-2021:1560-1", "OPENSUSE-SU-2021:1611-1", "OPENSUSE-SU-2021:1825-1", "OPENSUSE-SU-2021:1917-1", "OPENSUSE-SU-2021:2012-1", "OPENSUSE-SU-2021:2320-1", "OPENSUSE-SU-2021:2327-1", "OPENSUSE-SU-2021:2353-1", "OPENSUSE-SU-2021:2682-1", "OPENSUSE-SU-2021:2685-1", "OPENSUSE-SU-2021:3942-1", "OPENSUSE-SU-2021:4154-1", "OPENSUSE-SU-2022:0182-1", "OPENSUSE-SU-2022:0182-2", "OPENSUSE-SU-2022:2649-1", "SUSE-SU-2022:1454-1", "SUSE-SU-2022:2405-1", "SUSE-SU-2022:2405-2", "SUSE-SU-2022:2649-1"]}, {"type": "symantec", "idList": ["SMNTC-110157", "SMNTC-110222", "SMNTC-17849"]}, {"type": "talos", "idList": ["TALOS-2020-1124", "TALOS-2020-1155", "TALOS-2020-1195"]}, {"type": "thn", "idList": ["THN:D65992731CD4A3B443CD2E03761CE18B"]}, {"type": "threatpost", "idList": ["THREATPOST:7EE6BCA3A1DEFF8B86DA40BBBB994643"]}, {"type": "ubuntu", "idList": ["USN-3853-1", "USN-3859-1", "USN-3938-1", "USN-4040-1", "USN-4040-2", "USN-4049-1", "USN-4049-2", "USN-4132-1", "USN-4132-2", "USN-4151-1", "USN-4151-2", "USN-4165-1", "USN-4176-1", "USN-4202-1", "USN-4202-2", "USN-4219-1", "USN-4236-1", "USN-4236-2", "USN-4236-3", "USN-4256-1", "USN-4274-1", "USN-4293-1", "USN-4327-1", "USN-4333-1", "USN-4333-2", "USN-4335-1", "USN-4384-1", "USN-4394-1", "USN-4402-1", "USN-4416-1", "USN-4428-1", "USN-4438-1", "USN-4466-1", "USN-4466-2", "USN-4491-1", "USN-4568-1", "USN-4581-1", "USN-4601-1", "USN-4635-1", "USN-4648-1", "USN-4665-1", "USN-4665-2", "USN-4677-1", "USN-4677-2", "USN-4705-1", "USN-4742-1", "USN-4754-1", "USN-4754-2", "USN-4754-3", "USN-4754-4", "USN-4754-5", "USN-4852-1", "USN-4891-1", "USN-4906-1", "USN-4968-1", "USN-4968-2", "USN-4991-1", "USN-5038-1", "USN-5200-1", "USN-5273-1", "USN-5310-1", "USN-5380-1", "USN-5431-1", "USN-5455-1", "USN-5699-1", "USN-5768-1", "USN-5812-1", "USN-6142-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2016-10228", "UB:CVE-2017-14502", "UB:CVE-2018-1000858", "UB:CVE-2018-20843", "UB:CVE-2019-13012", "UB:CVE-2019-13050", "UB:CVE-2019-13627", "UB:CVE-2019-14866", "UB:CVE-2019-14889", "UB:CVE-2019-15903", "UB:CVE-2019-16935", "UB:CVE-2019-18276", "UB:CVE-2019-19221", "UB:CVE-2019-19906", "UB:CVE-2019-19956", "UB:CVE-2019-20387", "UB:CVE-2019-20388", "UB:CVE-2019-20454", "UB:CVE-2019-20838", "UB:CVE-2019-20907", "UB:CVE-2019-20916", "UB:CVE-2019-25013", "UB:CVE-2019-3842", "UB:CVE-2019-9169", "UB:CVE-2020-11080", "UB:CVE-2020-13434", "UB:CVE-2020-13543", "UB:CVE-2020-13584", "UB:CVE-2020-13776", "UB:CVE-2020-13777", "UB:CVE-2020-14422", "UB:CVE-2020-15358", "UB:CVE-2020-1730", "UB:CVE-2020-24659", "UB:CVE-2020-24977", "UB:CVE-2020-26116", "UB:CVE-2020-26137", "UB:CVE-2020-27618", "UB:CVE-2020-27619", "UB:CVE-2020-28196", "UB:CVE-2020-29361", "UB:CVE-2020-29362", "UB:CVE-2020-29363", "UB:CVE-2020-7595", "UB:CVE-2020-8177", "UB:CVE-2020-8231", "UB:CVE-2020-8284", "UB:CVE-2020-8285", "UB:CVE-2020-8286", "UB:CVE-2020-8492", "UB:CVE-2020-8927", "UB:CVE-2020-9948", "UB:CVE-2020-9951", "UB:CVE-2020-9983", "UB:CVE-2021-0646", "UB:CVE-2021-20271", "UB:CVE-2021-20305", "UB:CVE-2021-23239", "UB:CVE-2021-23240", "UB:CVE-2021-23336", "UB:CVE-2021-3326", "UB:CVE-2021-33503", "UB:CVE-2021-3449", "UB:CVE-2021-3450", "UB:CVE-2021-3516", "UB:CVE-2021-3517", "UB:CVE-2021-3520", "UB:CVE-2021-3541", "UB:CVE-2021-40491"]}, {"type": "veracode", "idList": ["VERACODE:20528", "VERACODE:20633", "VERACODE:20639", "VERACODE:21433", "VERACODE:22010", "VERACODE:22153", "VERACODE:22327", "VERACODE:22335", "VERACODE:22336", "VERACODE:22337", "VERACODE:25287", "VERACODE:25605", "VERACODE:25613", "VERACODE:25741", "VERACODE:25763", "VERACODE:26072", "VERACODE:26092", "VERACODE:26143", "VERACODE:26206", "VERACODE:26270", "VERACODE:26465", "VERACODE:26646", "VERACODE:26648", "VERACODE:26658", "VERACODE:27281", "VERACODE:27464", "VERACODE:27610", "VERACODE:27809", "VERACODE:27819", "VERACODE:27820", "VERACODE:27978", "VERACODE:28262", "VERACODE:28566", "VERACODE:28567", "VERACODE:28570", "VERACODE:28579", "VERACODE:28580", "VERACODE:28581", "VERACODE:28972", "VERACODE:28973", "VERACODE:29276", "VERACODE:29449", "VERACODE:29500", "VERACODE:29798", "VERACODE:29835", "VERACODE:29836", "VERACODE:30010", "VERACODE:30231", "VERACODE:30239", "VERACODE:30241", "VERACODE:30255", "VERACODE:30257", "VERACODE:30389", "VERACODE:30392", "VERACODE:30555", "VERACODE:30556", "VERACODE:30558", "VERACODE:30597", "VERACODE:30606", "VERACODE:30611", "VERACODE:30612", "VERACODE:30613", "VERACODE:30782", "VERACODE:7880"]}, {"type": "zdi", "idList": ["ZDI-20-1214"]}, {"type": "zdt", "idList": ["1337DAY-ID-32581", "1337DAY-ID-33597"]}]}, "affected_software": {"major_version": [{"name": "ibm qradar siem", "version": 7}, {"name": "ibm qradar siem", "version": 7}]}, "epss": [{"cve": "CVE-2016-10228", "epss": 0.00666, "percentile": 0.76716, "modified": "2023-05-02"}, {"cve": "CVE-2017-14502", "epss": 0.00749, "percentile": 0.78274, "modified": "2023-05-02"}, {"cve": "CVE-2018-1000858", "epss": 0.00244, "percentile": 0.60898, "modified": "2023-05-02"}, {"cve": "CVE-2018-20843", "epss": 0.91481, "percentile": 0.98359, "modified": "2023-05-01"}, {"cve": "CVE-2019-13012", "epss": 0.00288, "percentile": 0.64157, "modified": "2023-05-01"}, {"cve": "CVE-2019-13050", "epss": 0.00527, "percentile": 0.73548, "modified": "2023-05-01"}, {"cve": "CVE-2019-13627", "epss": 0.0019, "percentile": 0.54946, "modified": "2023-05-01"}, {"cve": "CVE-2019-14866", "epss": 0.00053, "percentile": 0.18732, "modified": "2023-05-01"}, {"cve": "CVE-2019-14889", "epss": 0.0069, "percentile": 0.77215, "modified": "2023-05-01"}, {"cve": "CVE-2019-15903", "epss": 0.00365, "percentile": 0.68239, "modified": "2023-05-01"}, {"cve": "CVE-2019-16935", "epss": 0.00217, "percentile": 0.58186, "modified": "2023-05-01"}, {"cve": "CVE-2019-18276", "epss": 0.00102, "percentile": 0.4032, "modified": "2023-05-01"}, {"cve": "CVE-2019-19221", "epss": 0.00076, "percentile": 0.30719, "modified": "2023-05-01"}, {"cve": "CVE-2019-19906", "epss": 0.00196, "percentile": 0.55932, "modified": "2023-05-01"}, {"cve": "CVE-2019-19956", "epss": 0.00548, "percentile": 0.74068, "modified": "2023-05-01"}, {"cve": "CVE-2019-20387", "epss": 0.00132, "percentile": 0.46895, "modified": "2023-05-01"}, {"cve": "CVE-2019-20388", "epss": 0.01001, "percentile": 0.8141, "modified": "2023-05-01"}, {"cve": "CVE-2019-20454", "epss": 0.00276, "percentile": 0.63382, "modified": "2023-05-01"}, {"cve": "CVE-2019-20907", "epss": 0.00565, "percentile": 0.74481, "modified": "2023-05-01"}, {"cve": "CVE-2019-20916", "epss": 0.00202, "percentile": 0.56686, "modified": "2023-05-01"}, {"cve": "CVE-2019-25013", "epss": 0.00211, "percentile": 0.57515, "modified": "2023-05-01"}, {"cve": "CVE-2019-2708", "epss": 0.00091, "percentile": 0.37682, "modified": "2023-05-01"}, {"cve": "CVE-2019-3842", "epss": 0.00162, "percentile": 0.51405, "modified": "2023-05-01"}, {"cve": "CVE-2019-9169", "epss": 0.0029, "percentile": 0.64361, "modified": "2023-05-02"}, {"cve": "CVE-2020-11080", "epss": 0.00788, "percentile": 0.78926, "modified": "2023-05-01"}, {"cve": "CVE-2020-13434", "epss": 0.00063, "percentile": 0.24986, "modified": "2023-05-01"}, {"cve": "CVE-2020-13543", "epss": 0.01293, "percentile": 0.83788, "modified": "2023-05-01"}, {"cve": "CVE-2020-13584", "epss": 0.00762, "percentile": 0.78516, "modified": "2023-05-01"}, {"cve": "CVE-2020-13776", "epss": 0.00044, "percentile": 0.10277, "modified": "2023-05-01"}, {"cve": "CVE-2020-13777", "epss": 0.0026, "percentile": 0.62242, "modified": "2023-05-01"}, {"cve": "CVE-2020-14352", "epss": 0.00179, "percentile": 0.53573, "modified": "2023-05-01"}, {"cve": "CVE-2020-14422", "epss": 0.01257, "percentile": 0.8354, "modified": "2023-05-01"}, {"cve": "CVE-2020-15358", "epss": 0.00078, "percentile": 0.32192, "modified": "2023-05-01"}, {"cve": "CVE-2020-1730", "epss": 0.00443, "percentile": 0.71106, "modified": "2023-05-01"}, {"cve": "CVE-2020-24659", "epss": 0.00466, "percentile": 0.71828, "modified": "2023-05-01"}, {"cve": "CVE-2020-24977", "epss": 0.00236, "percentile": 0.60196, "modified": "2023-05-01"}, {"cve": "CVE-2020-26116", "epss": 0.00176, "percentile": 0.53261, "modified": "2023-05-01"}, {"cve": "CVE-2020-27618", "epss": 0.00053, "percentile": 0.18824, "modified": "2023-05-01"}, {"cve": "CVE-2020-27619", "epss": 0.00322, "percentile": 0.66183, "modified": "2023-05-01"}, {"cve": "CVE-2020-28196", "epss": 0.00328, "percentile": 0.66518, "modified": "2023-05-01"}, {"cve": "CVE-2020-29361", "epss": 0.00358, "percentile": 0.67914, "modified": "2023-05-01"}, {"cve": "CVE-2020-29362", "epss": 0.00091, "percentile": 0.37714, "modified": "2023-05-01"}, {"cve": "CVE-2020-29363", "epss": 0.00098, "percentile": 0.39398, "modified": "2023-05-01"}, {"cve": "CVE-2020-7595", "epss": 0.00484, "percentile": 0.7239, "modified": "2023-05-01"}, {"cve": "CVE-2020-8177", "epss": 0.00099, "percentile": 0.39654, "modified": "2023-05-01"}, {"cve": "CVE-2020-8231", "epss": 0.00197, "percentile": 0.56014, "modified": "2023-05-01"}, {"cve": "CVE-2020-8284", "epss": 0.00148, "percentile": 0.49432, "modified": "2023-05-01"}, {"cve": "CVE-2020-8285", "epss": 0.00364, "percentile": 0.68199, "modified": "2023-05-01"}, {"cve": "CVE-2020-8286", "epss": 0.0021, "percentile": 0.57438, "modified": "2023-05-01"}, {"cve": "CVE-2020-8492", "epss": 0.00273, "percentile": 0.63189, "modified": "2023-05-01"}, {"cve": "CVE-2020-8927", "epss": 0.00282, "percentile": 0.63787, "modified": "2023-05-01"}, {"cve": "CVE-2020-9948", "epss": 0.0016, "percentile": 0.51202, "modified": "2023-05-01"}, {"cve": "CVE-2020-9951", "epss": 0.00361, "percentile": 0.6808, "modified": "2023-05-01"}, {"cve": "CVE-2020-9983", "epss": 0.00365, "percentile": 0.68208, "modified": "2023-05-01"}, {"cve": "CVE-2021-20271", "epss": 0.00172, "percentile": 0.52864, "modified": "2023-05-01"}, {"cve": "CVE-2021-20305", "epss": 0.00415, "percentile": 0.70206, "modified": "2023-05-01"}, {"cve": "CVE-2021-23239", "epss": 0.00051, "percentile": 0.1795, "modified": "2023-05-01"}, {"cve": "CVE-2021-23240", "epss": 0.00075, "percentile": 0.30471, "modified": "2023-05-01"}, {"cve": "CVE-2021-23336", "epss": 0.00149, "percentile": 0.49521, "modified": "2023-05-01"}, {"cve": "CVE-2021-3326", "epss": 0.00389, "percentile": 0.69265, "modified": "2023-05-01"}, {"cve": "CVE-2021-33503", "epss": 0.00221, "percentile": 0.58765, "modified": "2023-05-01"}, {"cve": "CVE-2021-3449", "epss": 0.00292, "percentile": 0.64497, "modified": "2023-05-01"}, {"cve": "CVE-2021-3450", "epss": 0.00198, "percentile": 0.56154, "modified": "2023-05-01"}, {"cve": "CVE-2021-3516", "epss": 0.00089, "percentile": 0.36507, "modified": "2023-05-01"}, {"cve": "CVE-2021-3520", "epss": 0.00122, "percentile": 0.45064, "modified": "2023-05-01"}, {"cve": "CVE-2021-3541", "epss": 0.00068, "percentile": 0.27994, "modified": "2023-05-01"}], "vulnersScore": 10.2}, "_state": {"dependencies": 1687588226, "score": 1687589890, "affected_software_major_version": 0, "epss": 0}, "_internal": {"score_hash": "bee6a3650e2f70e82975436bef9f0254"}, "affectedSoftware": [{"version": "7.3", "operator": "eq", "name": "ibm qradar siem"}, {"version": "7.4", "operator": "eq", "name": "ibm qradar siem"}]}
{"redhat": [{"lastseen": "2023-09-12T04:36:23", "description": "Red Hat OpenShift Jaeger is Red Hat's distribution of the Jaeger project,\ntailored for installation into an on-premise OpenShift Container Platform\ninstallation.\n\nSecurity Fix(es):\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-06-23T15:33:42", "type": "redhat", "title": "(RHSA-2021:2532) Moderate: Red Hat OpenShift Jaeger 1.17.9 security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10228", "CVE-2017-14502", "CVE-2019-25013", "CVE-2019-2708", "CVE-2019-3842", "CVE-2019-9169", "CVE-2020-13434", "CVE-2020-13776", "CVE-2020-15358", "CVE-2020-24977", "CVE-2020-26116", "CVE-2020-27618", "CVE-2020-27619", "CVE-2020-28196", "CVE-2020-28362", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8927", "CVE-2021-20305", "CVE-2021-23336", "CVE-2021-27219", "CVE-2021-3114", "CVE-2021-3177", "CVE-2021-3326", "CVE-2021-3449", "CVE-2021-3450"], "modified": "2021-06-23T15:34:24", "id": "RHSA-2021:2532", "href": "https://access.redhat.com/errata/RHSA-2021:2532", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-09-12T04:36:23", "description": "Windows Container Support for Red Hat OpenShift allows you to deploy Windows container workloads running on Windows Server containers.\n\nSecurity Fix(es):\n\n* kubernetes: LoadBalancer Service type don't create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM (CVE-2021-25736)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* WMCO patch pub-key-hash annotation to Linux node (BZ#1945248)\n\n* LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath (BZ#1952917)\n\n* Telemetry info not completely available to identify windows nodes (BZ#1955319)\n\n* WMCO incorrectly shows node as ready after a failed configuration (BZ#1956412)\n\n* kube-proxy service terminated unexpectedly after recreated LB service (BZ#1963263)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-06-23T05:30:08", "type": "redhat", "title": "(RHSA-2021:2130) Moderate: Windows Container Support for Red Hat OpenShift 2.0.1 security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10228", "CVE-2017-14502", "CVE-2019-25013", "CVE-2019-2708", "CVE-2019-3842", "CVE-2019-9169", "CVE-2020-13434", "CVE-2020-13776", "CVE-2020-15358", "CVE-2020-24977", "CVE-2020-27618", "CVE-2020-28196", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8927", "CVE-2021-20305", "CVE-2021-25736", "CVE-2021-27219", "CVE-2021-3326", "CVE-2021-3449", "CVE-2021-3450"], "modified": "2021-06-23T05:30:43", "id": "RHSA-2021:2130", "href": "https://access.redhat.com/errata/RHSA-2021:2130", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-09-12T04:36:23", "description": "Red Hat OpenShift Container Storage is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Container Storage is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Container Storage provisions a multicloud data management service\nwith an S3 compatible API.\n\nSecurity Fix(es):\n\n* NooBaa: noobaa-operator leaking RPC AuthToken into log files (CVE-2021-3528)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Currently, a newly restored PVC cannot be mounted if some of the OpenShift Container Platform nodes are running on a version of Red Hat Enterprise Linux which is less than 8.2, and the snapshot from which the PVC was restored is deleted. \nWorkaround: Do not delete the snapshot from which the PVC was restored until the restored PVC is deleted. (BZ#1962483)\n\n* Previously, the default backingstore was not created on AWS S3 when OpenShift Container Storage was deployed, due to incorrect identification of AWS S3. With this update, the default backingstore gets created when OpenShift Container Storage is deployed on AWS S3. (BZ#1927307)\n\n* Previously, log messages were printed to the endpoint pod log even if the debug option was not set. With this update, the log messages are printed to the endpoint pod log only when the debug option is set. (BZ#1938106)\n\n* Previously, the PVCs could not be provisioned as the `rook-ceph-mds` did not register the pod IP on the monitor servers, and hence every mount on the filesystem timed out, resulting in CephFS volume provisioning failure. With this update, an argument `--public-addr=podIP` is added to the MDS pod when the host network is not enabled, and hence the CephFS volume provisioning does not fail. (BZ#1949558)\n\n* Previously, OpenShift Container Storage 4.2 clusters were not updated with the correct cache value, and hence MDSs in standby-replay might report an oversized cache, as rook did not apply the `mds_cache_memory_limit` argument during upgrades. With this update, the `mds_cache_memory_limit` argument is applied during upgrades and the mds daemon operates normally. (BZ#1951348)\n\n* Previously, the coredumps were not generated in the correct location as rook was setting the config option `log_file` to an empty string since logging happened on stdout and not on the files, and hence Ceph read the value of the `log_file` to build the dump path. With this update, rook does not set the `log_file` and keeps Ceph's internal default, and hence the coredumps are generated in the correct location and are accessible under `/var/log/ceph/`. (BZ#1938049)\n\n* Previously, Ceph became inaccessible, as the mons lose quorum if a mon pod was drained while another mon was failing over. With this update, voluntary mon drains are prevented while a mon is failing over, and hence Ceph does not become inaccessible. (BZ#1946573)\n\n* Previously, the mon quorum was at risk, as the operator could erroneously remove the new mon if the operator was restarted during a mon failover. With this update, the operator completes the same mon failover after the operator is restarted, and hence the mon quorum is more reliable in the node drains and mon failover scenarios. (BZ#1959983)\n\nAll users of Red Hat OpenShift Container Storage are advised to pull these\nnew images from the Red Hat Container Registry.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-06-17T15:42:10", "type": "redhat", "title": "(RHSA-2021:2479) Moderate: Red Hat OpenShift Container Storage 4.6.5 security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10228", "CVE-2017-14502", "CVE-2019-13012", "CVE-2019-14866", "CVE-2019-25013", "CVE-2019-2708", "CVE-2019-3842", "CVE-2019-9169", "CVE-2020-13434", "CVE-2020-13543", "CVE-2020-13584", "CVE-2020-13776", "CVE-2020-15358", "CVE-2020-24977", "CVE-2020-25659", "CVE-2020-25678", "CVE-2020-26116", "CVE-2020-26137", "CVE-2020-27618", "CVE-2020-27619", "CVE-2020-27783", "CVE-2020-28196", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-36242", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8927", "CVE-2020-9948", "CVE-2020-9951", "CVE-2020-9983", "CVE-2021-20305", "CVE-2021-23239", "CVE-2021-23240", "CVE-2021-23336", "CVE-2021-3139", "CVE-2021-3177", "CVE-2021-3326", "CVE-2021-3449", "CVE-2021-3450", "CVE-2021-3528"], "modified": "2021-06-17T15:42:47", "id": "RHSA-2021:2479", "href": "https://access.redhat.com/errata/RHSA-2021:2479", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-09-12T04:36:23", "description": "Red Hat OpenShift Serverless 1.16.0 release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6 and 4.7, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.\n\nSecurity Fix(es):\n\n* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)\n\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-13T16:31:04", "type": "redhat", "title": "(RHSA-2021:2705) Moderate: Release of OpenShift Serverless 1.16.0", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10228", "CVE-2017-14502", "CVE-2019-25013", "CVE-2019-2708", "CVE-2019-3842", "CVE-2019-9169", "CVE-2020-13434", "CVE-2020-13776", "CVE-2020-15358", "CVE-2020-24977", "CVE-2020-27618", "CVE-2020-28196", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8927", "CVE-2021-27219", "CVE-2021-27918", "CVE-2021-31525", "CVE-2021-33196", "CVE-2021-3326"], "modified": "2021-07-13T16:32:07", "id": "RHSA-2021:2705", "href": "https://access.redhat.com/errata/RHSA-2021:2705", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-09-12T04:36:23", "description": "Red Hat OpenShift Jaeger is Red Hat's distribution of the Jaeger project,\ntailored for installation into an on-premise OpenShift Container Platform\ninstallation.\n\nSecurity Fix(es):\n\n* libthrift: potential DoS when processing untrusted payloads (CVE-2020-13949)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions (CVE-2020-28500)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\n* nodejs-lodash: command injection via template (CVE-2021-23337)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-06-24T15:15:19", "type": "redhat", "title": "(RHSA-2021:2543) Moderate: Red Hat OpenShift Jaeger 1.20.4 security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10228", "CVE-2017-14502", "CVE-2019-25013", "CVE-2019-2708", "CVE-2019-3842", "CVE-2019-9169", "CVE-2020-13434", "CVE-2020-13776", "CVE-2020-13949", "CVE-2020-15358", "CVE-2020-24977", "CVE-2020-26116", "CVE-2020-27618", "CVE-2020-27619", "CVE-2020-28196", "CVE-2020-28362", "CVE-2020-28500", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8927", "CVE-2021-20305", "CVE-2021-23336", "CVE-2021-23337", "CVE-2021-27219", "CVE-2021-3114", "CVE-2021-31525", "CVE-2021-3177", "CVE-2021-3326", "CVE-2021-3449", "CVE-2021-3450"], "modified": "2021-07-20T17:07:45", "id": "RHSA-2021:2543", "href": "https://access.redhat.com/errata/RHSA-2021:2543", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-08-16T15:29:43", "description": "Red Hat OpenShift Serverless 1.10.2 is a generally available release of the OpenShift Serverless Operator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform version 4.5.\n\nSecurity Fix(es):\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\n* golang: cmd/go: packages using cgo can cause arbitrary code execution at build time (CVE-2021-3115)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-19T02:03:59", "type": "redhat", "title": "(RHSA-2021:2021) Moderate: Release of OpenShift Serverless 1.10.2 security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-1000858", "CVE-2018-20843", "CVE-2019-13050", "CVE-2019-13627", "CVE-2019-14889", "CVE-2019-15903", "CVE-2019-16168", "CVE-2019-16935", "CVE-2019-19221", "CVE-2019-19906", "CVE-2019-19956", "CVE-2019-20218", "CVE-2019-20387", "CVE-2019-20388", "CVE-2019-20454", "CVE-2019-20907", "CVE-2019-20916", "CVE-2019-5018", "CVE-2020-13630", "CVE-2020-13631", "CVE-2020-13632", "CVE-2020-14422", "CVE-2020-1730", "CVE-2020-6405", "CVE-2020-7595", "CVE-2020-8492", "CVE-2020-9327", "CVE-2021-20305", "CVE-2021-3114", "CVE-2021-3115", "CVE-2021-3449", "CVE-2021-3450"], "modified": "2021-05-19T02:04:48", "id": "RHSA-2021:2021", "href": "https://access.redhat.com/errata/RHSA-2021:2021", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-09-12T04:36:23", "description": "Red Hat OpenShift Serverless 1.17.0 release of the OpenShift Serverless\nOperator. This version of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.6, 4.7 and 4.8, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.\n\nSecurity Fix(es):\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic\n(CVE-2021-34558)\n* golang: net: lookup functions may return invalid host names (CVE-2021-33195)\n* golang: net/http/httputil: ReverseProxy forwards connection headers if first one is empty (CVE-2021-33197)\n* golang: match/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n* golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader (CVE-2021-27918)\n* golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header (CVE-2021-31525)\n* golang: archive/zip: malformed archive may cause panic or memory exhaustion (CVE-2021-33196)\n\nIt was found that the CVE-2021-27918, CVE-2021-31525 and CVE-2021-33196 have been incorrectly mentioned as fixed in RHSA for Serverless client kn 1.16.0. This has been fixed (CVE-2021-3703).\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-09-16T15:07:32", "type": "redhat", "title": "(RHSA-2021:3556) Moderate: Release of OpenShift Serverless 1.17.0", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10228", "CVE-2017-14502", "CVE-2019-25013", "CVE-2019-2708", "CVE-2019-9169", "CVE-2020-13434", "CVE-2020-15358", "CVE-2020-27618", "CVE-2020-28196", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8927", "CVE-2021-20271", "CVE-2021-20305", "CVE-2021-27218", "CVE-2021-27918", "CVE-2021-31525", "CVE-2021-33195", "CVE-2021-33196", "CVE-2021-33197", "CVE-2021-33198", "CVE-2021-3326", "CVE-2021-3421", "CVE-2021-3449", "CVE-2021-3450", "CVE-2021-34558", "CVE-2021-3516", "CVE-2021-3517", "CVE-2021-3518", "CVE-2021-3520", "CVE-2021-3537", "CVE-2021-3541", "CVE-2021-3703"], "modified": "2021-09-16T15:08:26", "id": "RHSA-2021:3556", "href": "https://access.redhat.com/errata/RHSA-2021:3556", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-09-12T04:36:23", "description": "The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.\n\nSecurity Fix(es):\n\n* glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013)\n\n* glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over-read (CVE-2019-9169)\n\n* glibc: assertion failure in ISO-2022-JP-3 gconv module related to combining characters (CVE-2021-3326)\n\n* glibc: iconv program can hang when invoked with the -c option (CVE-2016-10228)\n\n* glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop (CVE-2020-27618)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-18T05:35:07", "type": "redhat", "title": "(RHSA-2021:1585) Moderate: glibc security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10228", "CVE-2019-25013", "CVE-2019-9169", "CVE-2020-27618", "CVE-2021-3326"], "modified": "2021-06-17T15:33:48", "id": "RHSA-2021:1585", "href": "https://access.redhat.com/errata/RHSA-2021:1585", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-08-04T12:27:59", "description": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nThe following packages have been upgraded to a later upstream version: rh-python36-python (3.6.12). (BZ#1873080)\n\nSecurity Fix(es):\n\n* python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935)\n\n* python: CRLF injection via the host part of the url passed to urlopen() (CVE-2019-18348)\n\n* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)\n\n* python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916)\n\n* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)\n\n* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)\n\n* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* rh-python36-python-pip: Contains multiple bundled libraries, and has no bundled() provides (BZ#1774951)\n\n* Allow rh-python36-python-pip to use system CA certificate Trust (BZ#1826520)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-10-19T17:43:31", "type": "redhat", "title": "(RHSA-2020:4285) Moderate: rh-python36 security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-16935", "CVE-2019-18348", "CVE-2019-20907", "CVE-2019-20916", "CVE-2020-14422", "CVE-2020-26116", "CVE-2020-8492"], "modified": "2020-10-19T17:55:05", "id": "RHSA-2020:4285", "href": "https://access.redhat.com/errata/RHSA-2020:4285", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-08-04T12:27:58", "description": "Red Hat OpenShift Serverless 1.11.0 is a generally available release of the\nOpenShift Serverless Operator. This version of the OpenShift Serverless\nOperator is supported on Red Hat OpenShift Container Platform version 4.6.\n\nSecurity Fix(es): \n * golang.org/x/text: possibility to trigger an infinite loop in encoding/unicode could lead to crash (CVE-2020-14040)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, see the CVE page(s) listed in the\nReferences section.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-11-18T13:59:56", "type": "redhat", "title": "(RHSA-2020:5149) Moderate: Release of OpenShift Serverless 1.11.0", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-20843", "CVE-2019-13050", "CVE-2019-13627", "CVE-2019-14889", "CVE-2019-1551", "CVE-2019-15903", "CVE-2019-16168", "CVE-2019-16935", "CVE-2019-19221", "CVE-2019-19906", "CVE-2019-19956", "CVE-2019-20218", "CVE-2019-20387", "CVE-2019-20388", "CVE-2019-20454", "CVE-2019-20907", "CVE-2019-20916", "CVE-2019-5018", "CVE-2020-10029", "CVE-2020-13630", "CVE-2020-13631", "CVE-2020-13632", "CVE-2020-14040", "CVE-2020-14422", "CVE-2020-1730", "CVE-2020-1751", "CVE-2020-1752", "CVE-2020-6405", "CVE-2020-7595", "CVE-2020-8177", "CVE-2020-8492", "CVE-2020-9327"], "modified": "2020-11-18T14:03:42", "id": "RHSA-2020:5149", "href": "https://access.redhat.com/errata/RHSA-2020:5149", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-08-16T15:29:43", "description": "The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.\n\nSecurity Fix(es):\n\n* curl: FTP PASV command response can cause curl to connect to arbitrary host (CVE-2020-8284)\n\n* curl: Malicious FTP server can trigger stack overflow when CURLOPT_CHUNK_BGN_FUNCTION is used (CVE-2020-8285)\n\n* curl: Inferior OCSP verification (CVE-2020-8286)\n\n* curl: Expired pointer dereference via multi API with CURLOPT_CONNECT_ONLY option set (CVE-2020-8231)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2021-05-18T05:39:00", "type": "redhat", "title": "(RHSA-2021:1610) Moderate: curl security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286"], "modified": "2021-05-18T11:37:19", "id": "RHSA-2021:1610", "href": "https://access.redhat.com/errata/RHSA-2021:1610", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2023-08-04T12:27:59", "description": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. \n\nSecurity Fix(es):\n\n* python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935)\n\n* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)\n\n* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)\n\n* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-03T12:04:08", "type": "redhat", "title": "(RHSA-2020:4433) Moderate: python3 security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.1, "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-16935", "CVE-2019-20907", "CVE-2020-14422", "CVE-2020-8492"], "modified": "2020-11-04T00:03:56", "id": "RHSA-2020:4433", "href": "https://access.redhat.com/errata/RHSA-2020:4433", "cvss": {"score": 7.1, "vector": "AV:N/AC:M/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-08-04T12:27:59", "description": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience.\n\nThis release adds the new Apache HTTP Server 2.4.37 Service Pack 3 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 2 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)\n* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)\n* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n* libxml2: There's a memory leak in xmlParseBalancedChunkMemoryRecover in parser.c that could result in a crash (CVE-2019-19956)\n* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)\n* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)\n* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)\n* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-06-22T13:04:38", "type": "redhat", "title": "(RHSA-2020:2646) Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-20843", "CVE-2019-0196", "CVE-2019-0197", "CVE-2019-15903", "CVE-2019-19956", "CVE-2019-20388", "CVE-2020-11080", "CVE-2020-1934", "CVE-2020-7595"], "modified": "2020-06-22T13:05:17", "id": "RHSA-2020:2646", "href": "https://access.redhat.com/errata/RHSA-2020:2646", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-08-04T12:27:59", "description": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c (CVE-2019-19956)\n\n* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)\n\n* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.3 Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-11-03T12:08:23", "type": "redhat", "title": "(RHSA-2020:4479) Moderate: libxml2 security update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19956", "CVE-2019-20388", "CVE-2020-7595"], "modified": "2020-11-04T00:04:29", "id": "RHSA-2020:4479", "href": "https://access.redhat.com/errata/RHSA-2020:4479", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-08-16T15:29:43", "description": "The p11-kit packages provide a mechanism to manage PKCS#11 modules. The p11-kit-trust subpackage includes a PKCS#11 trust module that provides certificate anchors and black lists based on configuration files.\n\nThe following packages have been upgraded to a later upstream version: p11-kit (0.23.22). (BZ#1887853)\n\nSecurity Fix(es):\n\n* p11-kit: integer overflow when allocating memory for arrays or attributes and object identifiers (CVE-2020-29361)\n\n* p11-kit: out-of-bounds read in p11_rpc_buffer_get_byte_array function in rpc-message.c (CVE-2020-29362)\n\n* p11-kit: out-of-bounds write in p11_rpc_buffer_get_byte_array_value function in rpc-message.c (CVE-2020-29363)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2021-05-18T05:38:50", "type": "redhat", "title": "(RHSA-2021:1609) Moderate: p11-kit security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363"], "modified": "2021-05-18T11:38:24", "id": "RHSA-2021:1609", "href": "https://access.redhat.com/errata/RHSA-2021:1609", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-08-04T12:27:59", "description": "This release adds the new Apache HTTP Server 2.4.37 Service Pack 3 packages that are part of the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services Pack Apache Server 2.4.37 Service Pack 2 and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes and enhancements included in this release.\n\nSecurity fix(es):\n\n* httpd: mod_http2: read-after-free on a string compare (CVE-2019-0196)\n* httpd: mod_http2: possible crash on late upgrade (CVE-2019-0197)\n* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)\n* nghttp2: overly large SETTINGS frames can lead to DoS (CVE-2020-11080)\n* libxml2: There's a memory leak in xmlParseBalancedChunkMemoryRecover in parser.c that could result in a crash (CVE-2019-19956)\n* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)\n* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)\n* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843)\n* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-06-22T12:14:48", "type": "redhat", "title": "(RHSA-2020:2644) Important: Red Hat JBoss Core Services Apache HTTP Server 2.4.37 SP3 security update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-20843", "CVE-2019-0196", "CVE-2019-0197", "CVE-2019-15903", "CVE-2019-19956", "CVE-2019-20388", "CVE-2020-11080", "CVE-2020-1934", "CVE-2020-7595"], "modified": "2020-06-22T12:21:17", "id": "RHSA-2020:2644", "href": "https://access.redhat.com/errata/RHSA-2020:2644", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-08-04T12:27:59", "description": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c (CVE-2019-19956)\n\n* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388)\n\n* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.9 Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-09-29T07:49:53", "type": "redhat", "title": "(RHSA-2020:3996) Moderate: libxml2 security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19956", "CVE-2019-20388", "CVE-2020-7595"], "modified": "2020-09-29T09:42:45", "id": "RHSA-2020:3996", "href": "https://access.redhat.com/errata/RHSA-2020:3996", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2023-09-12T04:36:23", "description": "OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization 4.8.0 images:\n\nRHEL-8-CNV-4.8\n==============\n\nkubevirt-template-validator-container-v4.8.0-9\nkubevirt-ssp-operator-container-v4.8.0-41\nvirt-cdi-uploadserver-container-v4.8.0-25\ncnv-must-gather-container-v4.8.0-50\nvirt-cdi-uploadproxy-container-v4.8.0-25\nvirt-cdi-cloner-container-v4.8.0-25\nvirt-cdi-apiserver-container-v4.8.0-25\nkubevirt-v2v-conversion-container-v4.8.0-10\nhostpath-provisioner-operator-container-v4.8.0-17\nhyperconverged-cluster-webhook-container-v4.8.0-62\nhyperconverged-cluster-operator-container-v4.8.0-62\nvirt-cdi-operator-container-v4.8.0-25\nvirt-cdi-importer-container-v4.8.0-25\nvirt-cdi-controller-container-v4.8.0-25\ncnv-containernetworking-plugins-container-v4.8.0-14\nkubemacpool-container-v4.8.0-22\novs-cni-plugin-container-v4.8.0-17\novs-cni-marker-container-v4.8.0-17\nbridge-marker-container-v4.8.0-17\ncluster-network-addons-operator-container-v4.8.0-28\nkubernetes-nmstate-handler-container-v4.8.0-21\nvirtio-win-container-v4.8.0-9\nkubevirt-vmware-container-v4.8.0-11\nhostpath-provisioner-container-v4.8.0-14\nnode-maintenance-operator-container-v4.8.0-19\nvirt-launcher-container-v4.8.0-67\nvm-import-virtv2v-container-v4.8.0-18\nvm-import-controller-container-v4.8.0-18\nvm-import-operator-container-v4.8.0-18\nvirt-handler-container-v4.8.0-67\nvirt-api-container-v4.8.0-67\nvirt-controller-container-v4.8.0-67\nvirt-operator-container-v4.8.0-67\nhco-bundle-registry-container-v4.8.0-451\n\nSecurity Fix(es):\n\n* golang: crypto/ssh: crafted authentication request can lead to nil pointer dereference (CVE-2020-29652)\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\n* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-07-27T12:20:29", "type": "redhat", "title": "(RHSA-2021:2920) Moderate: OpenShift Virtualization 4.8.0 Images", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10228", "CVE-2017-14502", "CVE-2019-13012", "CVE-2019-14866", "CVE-2019-25013", "CVE-2019-25032", "CVE-2019-25034", "CVE-2019-25035", "CVE-2019-25036", "CVE-2019-25037", "CVE-2019-25038", "CVE-2019-25039", "CVE-2019-25040", "CVE-2019-25041", "CVE-2019-25042", "CVE-2019-2708", "CVE-2019-3842", "CVE-2019-9169", "CVE-2020-12362", "CVE-2020-12363", "CVE-2020-12364", "CVE-2020-13434", "CVE-2020-13543", "CVE-2020-13584", "CVE-2020-13776", "CVE-2020-14344", "CVE-2020-14345", "CVE-2020-14346", "CVE-2020-14347", "CVE-2020-14360", "CVE-2020-14361", "CVE-2020-14362", "CVE-2020-14363", "CVE-2020-15358", "CVE-2020-24977", "CVE-2020-25659", "CVE-2020-25712", "CVE-2020-26116", "CVE-2020-26137", "CVE-2020-26541", "CVE-2020-27618", "CVE-2020-27619", "CVE-2020-27813", "CVE-2020-28196", "CVE-2020-28935", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-29652", "CVE-2020-36242", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8927", "CVE-2020-9948", "CVE-2020-9951", "CVE-2020-9983", "CVE-2021-20201", "CVE-2021-20271", "CVE-2021-23239", "CVE-2021-23240", "CVE-2021-23336", "CVE-2021-25215", "CVE-2021-25217", "CVE-2021-27219", "CVE-2021-28211", "CVE-2021-29482", "CVE-2021-3114", "CVE-2021-3121", "CVE-2021-3177", "CVE-2021-33034", "CVE-2021-3326", "CVE-2021-3516", "CVE-2021-3517", "CVE-2021-3518", "CVE-2021-3520", "CVE-2021-3537", "CVE-2021-3541", "CVE-2021-3560"], "modified": "2021-07-27T12:21:10", "id": "RHSA-2021:2920", "href": "https://access.redhat.com/errata/RHSA-2021:2920", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-09-12T04:36:23", "description": "OpenShift Virtualization is Red Hat's virtualization solution designed for Red Hat OpenShift Container Platform.\n\nThis advisory contains the following OpenShift Virtualization <version_number> images:\n\nRHEL-8-CNV-2.6\n\nhostpath-provisioner-container-v2.6.6-3\nvm-import-controller-container-v2.6.6-5\nvm-import-virtv2v-container-v2.6.6-5\nvm-import-operator-container-v2.6.6-5\nvirt-cdi-apiserver-container-v2.6.6-4\nvirt-cdi-controller-container-v2.6.6-4\nvirt-cdi-cloner-container-v2.6.6-4\nvirt-cdi-importer-container-v2.6.6-4\nvirt-cdi-uploadserver-container-v2.6.6-4\nvirt-cdi-uploadproxy-container-v2.6.6-4\nvirt-cdi-operator-container-v2.6.6-4\novs-cni-marker-container-v2.6.6-5\nkubevirt-ssp-operator-container-v2.6.6-5\nkubemacpool-container-v2.6.6-7\nkubevirt-vmware-container-v2.6.6-4\nkubevirt-kvm-info-nfd-plugin-container-v2.6.6-4\nkubevirt-cpu-model-nfd-plugin-container-v2.6.6-4\nkubevirt-cpu-node-labeller-container-v2.6.6-4\nvirtio-win-container-v2.6.6-4\nkubevirt-template-validator-container-v2.6.6-4\ncnv-containernetworking-plugins-container-v2.6.6-4\nnode-maintenance-operator-container-v2.6.6-4\nkubevirt-v2v-conversion-container-v2.6.6-4\ncluster-network-addons-operator-container-v2.6.6-4\novs-cni-plugin-container-v2.6.6-4\nbridge-marker-container-v2.6.6-4\nkubernetes-nmstate-handler-container-v2.6.6-7\nhyperconverged-cluster-webhook-container-v2.6.6-4\ncnv-must-gather-container-v2.6.6-16\nhyperconverged-cluster-operator-container-v2.6.6-4\nvirt-launcher-container-v2.6.6-7\nhostpath-provisioner-operator-container-v2.6.6-5\nvirt-api-container-v2.6.6-7\nvirt-handler-container-v2.6.6-7\nvirt-controller-container-v2.6.6-7\nvirt-operator-container-v2.6.6-7\nhco-bundle-registry-container-v2.6.6-70\n\nSecurity Fix(es):\n\n* golang: crypto/elliptic: incorrect operations on the P-224 curve (CVE-2021-3114)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-08-10T13:16:13", "type": "redhat", "title": "(RHSA-2021:3119) Moderate: OpenShift Virtualization 2.6.6 Images security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10228", "CVE-2017-14502", "CVE-2019-13012", "CVE-2019-14866", "CVE-2019-25013", "CVE-2019-25032", "CVE-2019-25034", "CVE-2019-25035", "CVE-2019-25036", "CVE-2019-25037", "CVE-2019-25038", "CVE-2019-25039", "CVE-2019-25040", "CVE-2019-25041", "CVE-2019-25042", "CVE-2019-2708", "CVE-2019-9169", "CVE-2020-12362", "CVE-2020-12363", "CVE-2020-12364", "CVE-2020-13434", "CVE-2020-13543", "CVE-2020-13584", "CVE-2020-14344", "CVE-2020-14345", "CVE-2020-14346", "CVE-2020-14347", "CVE-2020-14360", "CVE-2020-14361", "CVE-2020-14362", "CVE-2020-14363", "CVE-2020-15358", "CVE-2020-25659", "CVE-2020-25712", "CVE-2020-26116", "CVE-2020-26137", "CVE-2020-27618", "CVE-2020-27619", "CVE-2020-28196", "CVE-2020-28935", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-36242", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8927", "CVE-2020-9948", "CVE-2020-9951", "CVE-2020-9983", "CVE-2021-20201", "CVE-2021-20271", "CVE-2021-23239", "CVE-2021-23240", "CVE-2021-23336", "CVE-2021-25215", "CVE-2021-25217", "CVE-2021-27219", "CVE-2021-28211", "CVE-2021-3114", "CVE-2021-3177", "CVE-2021-32399", "CVE-2021-3326", "CVE-2021-33909", "CVE-2021-33910", "CVE-2021-3516", "CVE-2021-3517", "CVE-2021-3518", "CVE-2021-3520", "CVE-2021-3537", "CVE-2021-3541", "CVE-2021-3560"], "modified": "2021-08-10T13:16:44", "id": "RHSA-2021:3119", "href": "https://access.redhat.com/errata/RHSA-2021:3119", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-08-16T15:29:43", "description": "Red Hat OpenShift Container Platform is Red Hat's cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the extra low-latency container images for Red Hat\nOpenShift Container Platform 4.7. See the following advisory for the\ncontainer images for this release:\n\nhttps://access.redhat.com/errata/RHSA-2020:5633\n\nSecurity Fix(es):\n\n* golang-github-gorilla-websocket: integer overflow leads to denial of service (CVE-2020-27813)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Configuring the system with non-RT kernel will hang the system (BZ#1923220)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-02-24T18:09:49", "type": "redhat", "title": "(RHSA-2020:5364) Moderate: OpenShift Container Platform 4.7 low-latency extras security and bug fix update", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-20843", "CVE-2019-13050", "CVE-2019-13627", "CVE-2019-14889", "CVE-2019-15165", "CVE-2019-15903", "CVE-2019-16168", "CVE-2019-16935", "CVE-2019-17450", "CVE-2019-19221", "CVE-2019-19906", "CVE-2019-19956", "CVE-2019-20218", "CVE-2019-20387", "CVE-2019-20388", "CVE-2019-20454", "CVE-2019-20907", "CVE-2019-20916", "CVE-2019-5018", "CVE-2020-10029", "CVE-2020-10722", "CVE-2020-10723", "CVE-2020-10725", "CVE-2020-10726", "CVE-2020-13630", "CVE-2020-13631", "CVE-2020-13632", "CVE-2020-14382", "CVE-2020-14422", "CVE-2020-1730", "CVE-2020-1751", "CVE-2020-1752", "CVE-2020-1971", "CVE-2020-24659", "CVE-2020-25211", "CVE-2020-27813", "CVE-2020-6405", "CVE-2020-7595", "CVE-2020-8492", "CVE-2020-9327"], "modified": "2021-02-24T18:10:31", "id": "RHSA-2020:5364", "href": "https://access.redhat.com/errata/RHSA-2020:5364", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-09-12T04:36:23", "description": "Openshift Logging Bug Fix Release (5.0.4)\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-26T20:03:09", "type": "redhat", "title": "(RHSA-2021:2136) Moderate: Openshift Logging security and bugs update (5.0.4)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10228", "CVE-2019-13012", "CVE-2019-18811", "CVE-2019-19523", "CVE-2019-19528", "CVE-2019-25013", "CVE-2019-2708", "CVE-2019-3842", "CVE-2019-9169", "CVE-2020-0431", "CVE-2020-10543", "CVE-2020-10878", "CVE-2020-11608", "CVE-2020-12114", "CVE-2020-12362", "CVE-2020-12464", "CVE-2020-13434", "CVE-2020-13543", "CVE-2020-13584", "CVE-2020-13776", "CVE-2020-14314", "CVE-2020-14344", "CVE-2020-14345", "CVE-2020-14346", "CVE-2020-14347", "CVE-2020-14356", "CVE-2020-14360", "CVE-2020-14361", "CVE-2020-14362", "CVE-2020-14363", "CVE-2020-15358", "CVE-2020-15437", "CVE-2020-24394", "CVE-2020-24977", "CVE-2020-25212", "CVE-2020-25284", "CVE-2020-25285", "CVE-2020-25643", "CVE-2020-25704", "CVE-2020-25712", "CVE-2020-26116", "CVE-2020-26137", "CVE-2020-27618", "CVE-2020-27619", "CVE-2020-27786", "CVE-2020-27835", "CVE-2020-28196", "CVE-2020-28974", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-35508", "CVE-2020-36322", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8927", "CVE-2020-9948", "CVE-2020-9951", "CVE-2020-9983", "CVE-2021-0342", "CVE-2021-20305", "CVE-2021-23336", "CVE-2021-3121", "CVE-2021-3177", "CVE-2021-3326"], "modified": "2021-05-26T20:04:00", "id": "RHSA-2021:2136", "href": "https://access.redhat.com/errata/RHSA-2021:2136", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-27T10:23:28", "description": "Red Hat OpenShift Serverless 1.12.0 is a generally available release of the\nOpenShift Serverless Operator. \n\nThis version of the OpenShift Serverless\nOperator is supported on Red Hat OpenShift Container Platform version 4.6, and includes security and bug fixes and enhancements. For more information, see the documentation listed in the References section.\n\nSecurity Fix(es):\n\n* golang: default Content-Type setting in net/http/cgi and net/http/fcgi could cause XSS (CVE-2020-24553)\n\n* golang: math/big: panic during recursive division of very large numbers (CVE-2020-28362)\n\n* golang: malicious symbol names can lead to code execution at build time (CVE-2020-28366)\n\n* golang: improper validation of cgo flags can lead to code execution at build time (CVE-2020-28367)\n\nFor more details about the security issues and their impact, the CVSS\nscore, acknowledgements, and other related information, see the CVE pages\nlisted in the References section.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-01-14T13:24:22", "type": "redhat", "title": "(RHSA-2021:0146) Moderate: Release of OpenShift Serverless 1.12.0", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-20843", "CVE-2019-13050", "CVE-2019-13627", "CVE-2019-14889", "CVE-2019-15903", "CVE-2019-16168", "CVE-2019-19221", "CVE-2019-19906", "CVE-2019-19956", "CVE-2019-20218", "CVE-2019-20387", "CVE-2019-20388", "CVE-2019-20454", "CVE-2019-5018", "CVE-2020-10029", "CVE-2020-13630", "CVE-2020-13631", "CVE-2020-13632", "CVE-2020-1730", "CVE-2020-1751", "CVE-2020-1752", "CVE-2020-1971", "CVE-2020-24553", "CVE-2020-24659", "CVE-2020-28362", "CVE-2020-28366", "CVE-2020-28367", "CVE-2020-6405", "CVE-2020-7595", "CVE-2020-9327"], "modified": "2021-01-14T13:26:31", "id": "RHSA-2021:0146", "href": "https://access.redhat.com/errata/RHSA-2021:0146", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-08-16T15:29:43", "description": "GNOME is the default desktop environment of Red Hat Enterprise Linux.\n\nThe following packages have been upgraded to a later upstream version: accountsservice (0.6.55), webkit2gtk3 (2.30.4). (BZ#1846376, BZ#1883304)\n\nSecurity Fix(es):\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)\n\n* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)\n\n* glib2: insecure permissions for files and directories (CVE-2019-13012)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-18T05:35:26", "type": "redhat", "title": "(RHSA-2021:1586) Moderate: GNOME security, bug fix, and enhancement update", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-13012", "CVE-2020-13543", "CVE-2020-13584", "CVE-2020-16125", "CVE-2020-9948", "CVE-2020-9951", "CVE-2020-9983", "CVE-2021-1817", "CVE-2021-1820", "CVE-2021-1825", "CVE-2021-1826", "CVE-2021-30661"], "modified": "2021-10-28T10:28:08", "id": "RHSA-2021:1586", "href": "https://access.redhat.com/errata/RHSA-2021:1586", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-09-12T04:36:23", "description": "Red Hat Advanced Cluster Management for Kubernetes 2.3.0 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability engineers face as they work across a range of public and\nprivate cloud environments. Clusters and applications are all visible and\nmanaged from a single console\u2014with security policy built in.\n\nThis advisory contains the container images for Red Hat Advanced Cluster\nManagement for Kubernetes, which fix several bugs and security issues. See\nthe following Release Notes documentation, which will be updated shortly\nfor this release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.3/html/release_notes/\n\nSecurity:\n\n* fastify-reply-from: crafted URL allows prefix scape of the proxied backend service (CVE-2021-21321)\n\n* fastify-http-proxy: crafted URL allows prefix scape of the proxied\nbackend service (CVE-2021-21322)\n\n* nodejs-netmask: improper input validation of octal input data (CVE-2021-28918)\n\n* redis: Integer overflow via STRALGO LCS command (CVE-2021-29477)\n\n* redis: Integer overflow via COPY command for large intsets (CVE-2021-29478)\n\n* nodejs-glob-parent: Regular expression denial of service (CVE-2020-28469)\n\n* nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions\n(CVE-2020-28500)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while parsing -u- extension (CVE-2020-28851)\n\n* golang.org/x/text: Panic in language.ParseAcceptLanguage while processing\nbcp47 tag (CVE-2020-28852)\n\n* nodejs-ansi_up: XSS due to insufficient URL sanitization (CVE-2021-3377)\n\n* oras: zip-slip vulnerability via oras-pull (CVE-2021-21272)\n\n* redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms (CVE-2021-21309)\n\n* nodejs-lodash: command injection via template (CVE-2021-23337)\n\n* nodejs-hosted-git-info: Regular Expression denial of service via shortcutMatch in fromUrl() (CVE-2021-23362)\n\n* browserslist: parsing of invalid queries could result in Regular Expression Denial of Service (ReDoS) (CVE-2021-23364)\n\n* nodejs-postcss: Regular expression denial of service during source map parsing (CVE-2021-23368)\n\n* nodejs-handlebars: Remote code execution when compiling untrusted compile templates with strict:true option (CVE-2021-23369)\n\n* nodejs-postcss: ReDoS via getAnnotationURL() and loadAnnotation() in lib/previous-map.js (CVE-2021-23382)\n\n* nodejs-handlebars: Remote code execution when compiling untrusted compile templates with compat:true option (CVE-2021-23383)\n\n* openssl: integer overflow in CipherUpdate (CVE-2021-23840)\n\n* openssl: NULL pointer dereference in X509_issuer_and_serial_hash()\n(CVE-2021-23841)\n\n* nodejs-ua-parser-js: ReDoS via malicious User-Agent header (CVE-2021-27292)\n\n* grafana: snapshot feature allow an unauthenticated remote attacker to trigger a DoS via a remote API call (CVE-2021-27358)\n\n* nodejs-is-svg: ReDoS via malicious string (CVE-2021-28092)\n\n* nodejs-netmask: incorrectly parses an IP address that has octal integer with invalid character (CVE-2021-29418)\n\n* ulikunitz/xz: Infinite loop in readUvarint allows for denial of service (CVE-2021-29482)\n\n* normalize-url: ReDoS for data URLs (CVE-2021-33502)\n\n* nodejs-trim-newlines: ReDoS in .end() method (CVE-2021-33623)\n\n* nodejs-path-parse: ReDoS via splitDeviceRe, splitTailRe and splitPathRe (CVE-2021-23343)\n\n* html-parse-stringify: Regular Expression DoS (CVE-2021-23346)\n\n* openssl: incorrect SSLv2 rollback protection (CVE-2021-23839)\n\nFor more details about the security issues, including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npages listed in the References section.\n\nBugs:\n\n* RFE Make the source code for the endpoint-metrics-operator public (BZ# 1913444)\n\n* cluster became offline after apiserver health check (BZ# 1942589)", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 10.0, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2021-08-05T12:52:42", "type": "redhat", "title": "(RHSA-2021:3016) Important: Red Hat Advanced Cluster Management for Kubernetes version 2.3", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-10228", "CVE-2017-14502", "CVE-2018-1000858", "CVE-2018-20843", "CVE-2019-13050", "CVE-2019-13627", "CVE-2019-14889", "CVE-2019-15903", "CVE-2019-19906", "CVE-2019-20454", "CVE-2019-20934", "CVE-2019-25013", "CVE-2019-2708", "CVE-2019-9169", "CVE-2020-11668", "CVE-2020-13434", "CVE-2020-15358", "CVE-2020-1730", "CVE-2020-27618", "CVE-2020-28196", "CVE-2020-28469", "CVE-2020-28500", "CVE-2020-28851", "CVE-2020-28852", "CVE-2020-29361", "CVE-2020-29362", "CVE-2020-29363", "CVE-2020-8231", "CVE-2020-8284", "CVE-2020-8285", "CVE-2020-8286", "CVE-2020-8927", "CVE-2021-20271", "CVE-2021-20305", "CVE-2021-21272", "CVE-2021-21309", "CVE-2021-21321", "CVE-2021-21322", "CVE-2021-23337", "CVE-2021-23343", "CVE-2021-23346", "CVE-2021-23362", "CVE-2021-23364", "CVE-2021-23368", "CVE-2021-23369", "CVE-2021-23382", "CVE-2021-23383", "CVE-2021-23839", "CVE-2021-23840", "CVE-2021-23841", "CVE-2021-25217", "CVE-2021-27219", "CVE-2021-27292", "CVE-2021-27358", "CVE-2021-28092", "CVE-2021-28918", "CVE-2021-29418", "CVE-2021-29477", "CVE-2021-29478", "CVE-2021-29482", "CVE-2021-32399", "CVE-2021-33033", "CVE-2021-33034", "CVE-2021-3326", "CVE-2021-33502", "CVE-2021-33623", "CVE-2021-3377", "CVE-2021-33909", "CVE-2021-33910", "CVE-2021-3449", "CVE-2021-3450", "CVE-2021-3516", "CVE-2021-3517", "CVE-2021-3518", "CVE-2021-3520", "CVE-2021-3537", "CVE-2021-3541", "CVE-2021-3560"], "modified": "2021-08-05T12:52:59", "id": "RHSA-2021:3016", "href": "https://access.redhat.com/errata/RHSA-2021:3016", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2023-05-18T15:28:47", "description": "The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the CESA-2021:1586 advisory.\n\n - glib2: insecure permissions for files and directories (CVE-2019-13012)\n\n - webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543, CVE-2020-13584, CVE-2020-9951)\n\n - webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n - webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-19T00:00:00", "type": "nessus", "title": "CentOS 8 : GNOME (CESA-2021:1586)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-13012", "CVE-2020-13543", "CVE-2020-13584", "CVE-2020-9948", "CVE-2020-9951", "CVE-2020-9983"], "modified": "2021-06-02T00:00:00", "cpe": ["cpe:/o:centos:centos:8-stream", "p-cpe:/a:centos:centos:glib2", "p-cpe:/a:centos:centos:glib2-devel", "p-cpe:/a:centos:centos:glib2-doc", "p-cpe:/a:centos:centos:glib2-fam", "p-cpe:/a:centos:centos:glib2-static", "p-cpe:/a:centos:centos:glib2-tests", "p-cpe:/a:centos:centos:webkit2gtk3", "p-cpe:/a:centos:centos:webkit2gtk3-devel", "p-cpe:/a:centos:centos:webkit2gtk3-jsc", "p-cpe:/a:centos:centos:webkit2gtk3-jsc-devel"], "id": "CENTOS8_RHSA-2021-1586.NASL", "href": "https://www.tenable.com/plugins/nessus/149741", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# Red Hat Security Advisory RHSA-2021:1586. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149741);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/02\");\n\n script_cve_id(\n \"CVE-2019-13012\",\n \"CVE-2020-9948\",\n \"CVE-2020-9951\",\n \"CVE-2020-9983\",\n \"CVE-2020-13543\",\n \"CVE-2020-13584\"\n );\n script_xref(name:\"RHSA\", value:\"2021:1586\");\n\n script_name(english:\"CentOS 8 : GNOME (CESA-2021:1586)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote CentOS host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nCESA-2021:1586 advisory.\n\n - glib2: insecure permissions for files and directories (CVE-2019-13012)\n\n - webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543, CVE-2020-13584,\n CVE-2020-9951)\n\n - webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n - webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2021:1586\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-9983\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/19\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:8-stream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glib2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glib2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glib2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glib2-fam\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glib2-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glib2-tests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:webkit2gtk3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:webkit2gtk3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:webkit2gtk3-jsc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:webkit2gtk3-jsc-devel\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CentOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/CentOS/release');\nif (isnull(release) || 'CentOS' >!< release) audit(AUDIT_OS_NOT, 'CentOS');\nos_ver = pregmatch(pattern: \"CentOS(?: Stream)?(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'CentOS');\nos_ver = os_ver[1];\nif ('CentOS Stream' >!< release) audit(AUDIT_OS_NOT, 'CentOS 8-Stream');\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'CentOS 8.x', 'CentOS ' + os_ver);\n\nif (!get_kb_item('Host/CentOS/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'CentOS', cpu);\n\npkgs = [\n {'reference':'glib2-2.56.4-9.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-2.56.4-9.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-devel-2.56.4-9.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-devel-2.56.4-9.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-doc-2.56.4-9.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-doc-2.56.4-9.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-fam-2.56.4-9.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-fam-2.56.4-9.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-static-2.56.4-9.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-static-2.56.4-9.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-tests-2.56.4-9.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-tests-2.56.4-9.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-2.30.4-1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-2.30.4-1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-devel-2.30.4-1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-devel-2.30.4-1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-jsc-2.30.4-1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-jsc-2.30.4-1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-jsc-devel-2.30.4-1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-jsc-devel-2.30.4-1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'CentOS-' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'glib2 / glib2-devel / glib2-doc / glib2-fam / glib2-static / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-19T15:08:58", "description": "The remote Oracle Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2021-1585 advisory.\n\n - The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service. (CVE-2016-10228)\n\n - In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap- based buffer over-read via an attempted case-insensitive regular-expression match. (CVE-2019-9169)\n\n - The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228. (CVE-2020-27618)\n\n - The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. (CVE-2021-3326)\n\n - The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi- byte input sequences in the EUC-KR encoding, may have a buffer over-read. (CVE-2019-25013)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-26T00:00:00", "type": "nessus", "title": "Oracle Linux 8 : glibc (ELSA-2021-1585)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-10228", "CVE-2019-25013", "CVE-2019-9169", "CVE-2020-27618", "CVE-2021-3326"], "modified": "2021-05-26T00:00:00", "cpe": ["cpe:/o:oracle:linux:8", "p-cpe:/a:oracle:linux:compat-libpthread-nonshared", "p-cpe:/a:oracle:linux:glibc", "p-cpe:/a:oracle:linux:glibc-all-langpacks", "p-cpe:/a:oracle:linux:glibc-benchtests", "p-cpe:/a:oracle:linux:glibc-common", "p-cpe:/a:oracle:linux:glibc-devel", "p-cpe:/a:oracle:linux:glibc-headers", "p-cpe:/a:oracle:linux:glibc-langpack-aa", "p-cpe:/a:oracle:linux:glibc-langpack-af", "p-cpe:/a:oracle:linux:glibc-langpack-agr", "p-cpe:/a:oracle:linux:glibc-langpack-ak", "p-cpe:/a:oracle:linux:glibc-langpack-am", "p-cpe:/a:oracle:linux:glibc-langpack-an", "p-cpe:/a:oracle:linux:glibc-langpack-anp", "p-cpe:/a:oracle:linux:glibc-langpack-ar", "p-cpe:/a:oracle:linux:glibc-langpack-as", "p-cpe:/a:oracle:linux:glibc-langpack-ast", "p-cpe:/a:oracle:linux:glibc-langpack-ayc", "p-cpe:/a:oracle:linux:glibc-langpack-az", "p-cpe:/a:oracle:linux:glibc-langpack-be", "p-cpe:/a:oracle:linux:glibc-langpack-bem", "p-cpe:/a:oracle:linux:glibc-langpack-ber", "p-cpe:/a:oracle:linux:glibc-langpack-bg", "p-cpe:/a:oracle:linux:glibc-langpack-bhb", "p-cpe:/a:oracle:linux:glibc-langpack-bho", "p-cpe:/a:oracle:linux:glibc-langpack-bi", "p-cpe:/a:oracle:linux:glibc-langpack-bn", "p-cpe:/a:oracle:linux:glibc-langpack-bo", "p-cpe:/a:oracle:linux:glibc-langpack-br", "p-cpe:/a:oracle:linux:glibc-langpack-brx", "p-cpe:/a:oracle:linux:glibc-langpack-bs", "p-cpe:/a:oracle:linux:glibc-langpack-byn", "p-cpe:/a:oracle:linux:glibc-langpack-ca", "p-cpe:/a:oracle:linux:glibc-langpack-ce", "p-cpe:/a:oracle:linux:glibc-langpack-chr", "p-cpe:/a:oracle:linux:glibc-langpack-cmn", "p-cpe:/a:oracle:linux:glibc-langpack-crh", "p-cpe:/a:oracle:linux:glibc-langpack-cs", "p-cpe:/a:oracle:linux:glibc-langpack-csb", "p-cpe:/a:oracle:linux:glibc-langpack-cv", "p-cpe:/a:oracle:linux:glibc-langpack-cy", "p-cpe:/a:oracle:linux:glibc-langpack-da", "p-cpe:/a:oracle:linux:glibc-langpack-de", "p-cpe:/a:oracle:linux:glibc-langpack-doi", "p-cpe:/a:oracle:linux:glibc-langpack-dsb", "p-cpe:/a:oracle:linux:glibc-langpack-dv", "p-cpe:/a:oracle:linux:glibc-langpack-dz", "p-cpe:/a:oracle:linux:glibc-langpack-el", "p-cpe:/a:oracle:linux:glibc-langpack-en", "p-cpe:/a:oracle:linux:glibc-langpack-eo", "p-cpe:/a:oracle:linux:glibc-langpack-es", "p-cpe:/a:oracle:linux:glibc-langpack-et", "p-cpe:/a:oracle:linux:glibc-langpack-eu", "p-cpe:/a:oracle:linux:glibc-langpack-fa", "p-cpe:/a:oracle:linux:glibc-langpack-ff", "p-cpe:/a:oracle:linux:glibc-langpack-fi", "p-cpe:/a:oracle:linux:glibc-langpack-fil", "p-cpe:/a:oracle:linux:glibc-langpack-fo", "p-cpe:/a:oracle:linux:glibc-langpack-fr", "p-cpe:/a:oracle:linux:glibc-langpack-fur", "p-cpe:/a:oracle:linux:glibc-langpack-fy", "p-cpe:/a:oracle:linux:glibc-langpack-ga", "p-cpe:/a:oracle:linux:glibc-langpack-gd", "p-cpe:/a:oracle:linux:glibc-langpack-gez", "p-cpe:/a:oracle:linux:glibc-langpack-gl", "p-cpe:/a:oracle:linux:glibc-langpack-gu", "p-cpe:/a:oracle:linux:glibc-langpack-gv", "p-cpe:/a:oracle:linux:glibc-langpack-ha", "p-cpe:/a:oracle:linux:glibc-langpack-hak", "p-cpe:/a:oracle:linux:glibc-langpack-he", "p-cpe:/a:oracle:linux:glibc-langpack-hi", "p-cpe:/a:oracle:linux:glibc-langpack-hif", "p-cpe:/a:oracle:linux:glibc-langpack-hne", "p-cpe:/a:oracle:linux:glibc-langpack-hr", "p-cpe:/a:oracle:linux:glibc-langpack-hsb", "p-cpe:/a:oracle:linux:glibc-langpack-ht", "p-cpe:/a:oracle:linux:glibc-langpack-hu", "p-cpe:/a:oracle:linux:glibc-langpack-hy", "p-cpe:/a:oracle:linux:glibc-langpack-ia", "p-cpe:/a:oracle:linux:glibc-langpack-id", "p-cpe:/a:oracle:linux:glibc-langpack-ig", "p-cpe:/a:oracle:linux:glibc-langpack-ik", "p-cpe:/a:oracle:linux:glibc-langpack-is", "p-cpe:/a:oracle:linux:glibc-langpack-it", "p-cpe:/a:oracle:linux:glibc-langpack-iu", "p-cpe:/a:oracle:linux:glibc-langpack-ja", "p-cpe:/a:oracle:linux:glibc-langpack-ka", "p-cpe:/a:oracle:linux:glibc-langpack-kab", "p-cpe:/a:oracle:linux:glibc-langpack-kk", "p-cpe:/a:oracle:linux:glibc-langpack-kl", "p-cpe:/a:oracle:linux:glibc-langpack-km", "p-cpe:/a:oracle:linux:glibc-langpack-kn", "p-cpe:/a:oracle:linux:glibc-langpack-ko", "p-cpe:/a:oracle:linux:glibc-langpack-kok", "p-cpe:/a:oracle:linux:glibc-langpack-ks", "p-cpe:/a:oracle:linux:glibc-langpack-ku", "p-cpe:/a:oracle:linux:glibc-langpack-kw", "p-cpe:/a:oracle:linux:glibc-langpack-ky", "p-cpe:/a:oracle:linux:glibc-langpack-lb", "p-cpe:/a:oracle:linux:glibc-langpack-lg", "p-cpe:/a:oracle:linux:glibc-langpack-li", "p-cpe:/a:oracle:linux:glibc-langpack-lij", "p-cpe:/a:oracle:linux:glibc-langpack-ln", "p-cpe:/a:oracle:linux:glibc-langpack-lo", "p-cpe:/a:oracle:linux:glibc-langpack-lt", "p-cpe:/a:oracle:linux:glibc-langpack-lv", "p-cpe:/a:oracle:linux:glibc-langpack-lzh", "p-cpe:/a:oracle:linux:glibc-langpack-mag", "p-cpe:/a:oracle:linux:glibc-langpack-mai", "p-cpe:/a:oracle:linux:glibc-langpack-mfe", "p-cpe:/a:oracle:linux:glibc-langpack-mg", "p-cpe:/a:oracle:linux:glibc-langpack-mhr", "p-cpe:/a:oracle:linux:glibc-langpack-mi", "p-cpe:/a:oracle:linux:glibc-langpack-miq", "p-cpe:/a:oracle:linux:glibc-langpack-mjw", "p-cpe:/a:oracle:linux:glibc-langpack-mk", "p-cpe:/a:oracle:linux:glibc-langpack-ml", "p-cpe:/a:oracle:linux:glibc-langpack-mn", "p-cpe:/a:oracle:linux:glibc-langpack-mni", "p-cpe:/a:oracle:linux:glibc-langpack-mr", "p-cpe:/a:oracle:linux:glibc-langpack-ms", "p-cpe:/a:oracle:linux:glibc-langpack-mt", "p-cpe:/a:oracle:linux:glibc-langpack-my", "p-cpe:/a:oracle:linux:glibc-langpack-nan", "p-cpe:/a:oracle:linux:glibc-langpack-nb", "p-cpe:/a:oracle:linux:glibc-langpack-nds", "p-cpe:/a:oracle:linux:glibc-langpack-ne", "p-cpe:/a:oracle:linux:glibc-langpack-nhn", "p-cpe:/a:oracle:linux:glibc-langpack-niu", "p-cpe:/a:oracle:linux:glibc-langpack-nl", "p-cpe:/a:oracle:linux:glibc-langpack-nn", "p-cpe:/a:oracle:linux:glibc-langpack-nr", "p-cpe:/a:oracle:linux:glibc-langpack-nso", "p-cpe:/a:oracle:linux:glibc-langpack-oc", "p-cpe:/a:oracle:linux:glibc-langpack-om", "p-cpe:/a:oracle:linux:glibc-langpack-or", "p-cpe:/a:oracle:linux:glibc-langpack-os", "p-cpe:/a:oracle:linux:glibc-langpack-pa", "p-cpe:/a:oracle:linux:glibc-langpack-pap", "p-cpe:/a:oracle:linux:glibc-langpack-pl", "p-cpe:/a:oracle:linux:glibc-langpack-ps", "p-cpe:/a:oracle:linux:glibc-langpack-pt", "p-cpe:/a:oracle:linux:glibc-langpack-quz", "p-cpe:/a:oracle:linux:glibc-langpack-raj", "p-cpe:/a:oracle:linux:glibc-langpack-ro", "p-cpe:/a:oracle:linux:glibc-langpack-ru", "p-cpe:/a:oracle:linux:glibc-langpack-rw", "p-cpe:/a:oracle:linux:glibc-langpack-sa", "p-cpe:/a:oracle:linux:glibc-langpack-sah", "p-cpe:/a:oracle:linux:glibc-langpack-sat", "p-cpe:/a:oracle:linux:glibc-langpack-sc", "p-cpe:/a:oracle:linux:glibc-langpack-sd", "p-cpe:/a:oracle:linux:glibc-langpack-se", "p-cpe:/a:oracle:linux:glibc-langpack-sgs", "p-cpe:/a:oracle:linux:glibc-langpack-shn", "p-cpe:/a:oracle:linux:glibc-langpack-shs", "p-cpe:/a:oracle:linux:glibc-langpack-si", "p-cpe:/a:oracle:linux:glibc-langpack-sid", "p-cpe:/a:oracle:linux:glibc-langpack-sk", "p-cpe:/a:oracle:linux:glibc-langpack-sl", "p-cpe:/a:oracle:linux:glibc-langpack-sm", "p-cpe:/a:oracle:linux:glibc-langpack-so", "p-cpe:/a:oracle:linux:glibc-langpack-sq", "p-cpe:/a:oracle:linux:glibc-langpack-sr", "p-cpe:/a:oracle:linux:glibc-langpack-ss", "p-cpe:/a:oracle:linux:glibc-langpack-st", "p-cpe:/a:oracle:linux:glibc-langpack-sv", "p-cpe:/a:oracle:linux:glibc-langpack-sw", "p-cpe:/a:oracle:linux:glibc-langpack-szl", "p-cpe:/a:oracle:linux:glibc-langpack-ta", "p-cpe:/a:oracle:linux:glibc-langpack-tcy", "p-cpe:/a:oracle:linux:glibc-langpack-te", "p-cpe:/a:oracle:linux:glibc-langpack-tg", "p-cpe:/a:oracle:linux:glibc-langpack-th", "p-cpe:/a:oracle:linux:glibc-langpack-the", "p-cpe:/a:oracle:linux:glibc-langpack-ti", "p-cpe:/a:oracle:linux:glibc-langpack-tig", "p-cpe:/a:oracle:linux:glibc-langpack-tk", "p-cpe:/a:oracle:linux:glibc-langpack-tl", "p-cpe:/a:oracle:linux:glibc-langpack-tn", "p-cpe:/a:oracle:linux:glibc-langpack-to", "p-cpe:/a:oracle:linux:glibc-langpack-tpi", "p-cpe:/a:oracle:linux:glibc-langpack-tr", "p-cpe:/a:oracle:linux:glibc-langpack-ts", "p-cpe:/a:oracle:linux:glibc-langpack-tt", "p-cpe:/a:oracle:linux:glibc-langpack-ug", "p-cpe:/a:oracle:linux:glibc-langpack-uk", "p-cpe:/a:oracle:linux:glibc-langpack-unm", "p-cpe:/a:oracle:linux:glibc-langpack-ur", "p-cpe:/a:oracle:linux:glibc-langpack-uz", "p-cpe:/a:oracle:linux:glibc-langpack-ve", "p-cpe:/a:oracle:linux:glibc-langpack-vi", "p-cpe:/a:oracle:linux:glibc-langpack-wa", "p-cpe:/a:oracle:linux:glibc-langpack-wae", "p-cpe:/a:oracle:linux:glibc-langpack-wal", "p-cpe:/a:oracle:linux:glibc-langpack-wo", "p-cpe:/a:oracle:linux:glibc-langpack-xh", "p-cpe:/a:oracle:linux:glibc-langpack-yi", "p-cpe:/a:oracle:linux:glibc-langpack-yo", "p-cpe:/a:oracle:linux:glibc-langpack-yue", "p-cpe:/a:oracle:linux:glibc-langpack-yuw", "p-cpe:/a:oracle:linux:glibc-langpack-zh", "p-cpe:/a:oracle:linux:glibc-langpack-zu", "p-cpe:/a:oracle:linux:glibc-locale-source", "p-cpe:/a:oracle:linux:glibc-minimal-langpack", "p-cpe:/a:oracle:linux:glibc-nss-devel", "p-cpe:/a:oracle:linux:glibc-static", "p-cpe:/a:oracle:linux:glibc-utils", "p-cpe:/a:oracle:linux:libnsl", "p-cpe:/a:oracle:linux:nscd", "p-cpe:/a:oracle:linux:nss_db", "p-cpe:/a:oracle:linux:nss_hesiod"], "id": "ORACLELINUX_ELSA-2021-1585.NASL", "href": "https://www.tenable.com/plugins/nessus/149915", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2021-1585.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149915);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/05/26\");\n\n script_cve_id(\n \"CVE-2016-10228\",\n \"CVE-2019-9169\",\n \"CVE-2019-25013\",\n \"CVE-2020-27618\",\n \"CVE-2021-3326\"\n );\n\n script_name(english:\"Oracle Linux 8 : glibc (ELSA-2021-1585)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nELSA-2021-1585 advisory.\n\n - The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple\n suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite\n loop when processing invalid multi-byte input sequences, leading to a denial of service. (CVE-2016-10228)\n\n - In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-\n based buffer over-read via an attempted case-insensitive regular-expression match. (CVE-2019-9169)\n\n - The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid\n multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance\n the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a\n different vulnerability from CVE-2016-10228. (CVE-2020-27618)\n\n - The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid\n input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program,\n potentially resulting in a denial of service. (CVE-2021-3326)\n\n - The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-\n byte input sequences in the EUC-KR encoding, may have a buffer over-read. (CVE-2019-25013)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2021-1585.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-9169\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:compat-libpthread-nonshared\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-all-langpacks\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-benchtests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-aa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-af\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-agr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ak\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-am\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-an\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-anp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-as\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ast\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ayc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-az\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-be\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ber\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bhb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bho\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-br\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-brx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-byn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ce\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-chr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-cmn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-crh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-csb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-cv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-cy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-da\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-doi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-dsb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-dv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-dz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-en\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-eo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-es\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-et\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-eu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fil\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fur\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ga\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-gez\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-gl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-gu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-gv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ha\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hak\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-he\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hif\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hne\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hsb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ht\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-id\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ig\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ik\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-is\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-iu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ka\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kab\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-km\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kok\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ks\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ku\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ky\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-li\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lij\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ln\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lzh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mag\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mai\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mfe\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mhr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-miq\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mjw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mni\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-my\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nds\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ne\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nhn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-niu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nso\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-oc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-om\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-or\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-os\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-pa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-pap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ps\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-pt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-quz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-raj\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ro\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-rw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sah\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-se\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sgs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-shn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-shs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-si\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sid\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-so\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sq\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-st\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-szl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ta\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tcy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-te\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-th\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-the\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ti\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tig\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-to\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tpi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-uk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-unm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ur\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-uz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ve\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-vi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-wa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-wae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-wal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-wo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-xh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-yi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-yo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-yue\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-yuw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-zh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-zu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-locale-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-minimal-langpack\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libnsl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:nscd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:nss_db\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:nss_hesiod\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 8', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\n\npkgs = [\n {'reference':'compat-libpthread-nonshared-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'compat-libpthread-nonshared-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-2.28-151.0.1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-all-langpacks-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-all-langpacks-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-benchtests-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-benchtests-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-common-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-common-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-devel-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-devel-2.28-151.0.1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-devel-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-headers-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-headers-2.28-151.0.1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-headers-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-aa-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-aa-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-af-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-af-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-agr-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-agr-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ak-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ak-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-am-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-am-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-an-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-an-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-anp-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-anp-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ar-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ar-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-as-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-as-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ast-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ast-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ayc-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ayc-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-az-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-az-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-be-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-be-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bem-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bem-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ber-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ber-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bg-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bg-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bhb-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bhb-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bho-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bho-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bi-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bi-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bn-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bn-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bo-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bo-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-br-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-br-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-brx-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-brx-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bs-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bs-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-byn-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-byn-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ca-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ca-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ce-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ce-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-chr-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-chr-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cmn-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cmn-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-crh-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-crh-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cs-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cs-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-csb-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-csb-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cv-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cv-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cy-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cy-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-da-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-da-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-de-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-de-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-doi-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-doi-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dsb-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dsb-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dv-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dv-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dz-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dz-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-el-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-el-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-en-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-en-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-eo-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-eo-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-es-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-es-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-et-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-et-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-eu-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-eu-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fa-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fa-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ff-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ff-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fi-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fi-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fil-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fil-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fo-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fo-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fr-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fr-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fur-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fur-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fy-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fy-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ga-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ga-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gd-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gd-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gez-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gez-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gl-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gl-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gu-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gu-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gv-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gv-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ha-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ha-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hak-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hak-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-he-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-he-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hi-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hi-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hif-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hif-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hne-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hne-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hr-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hr-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hsb-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hsb-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ht-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ht-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hu-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hu-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hy-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hy-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ia-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ia-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-id-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-id-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ig-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ig-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ik-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ik-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-is-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-is-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-it-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-it-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-iu-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-iu-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ja-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ja-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ka-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ka-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kab-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kab-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kk-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kk-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kl-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kl-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-km-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-km-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kn-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kn-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ko-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ko-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kok-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kok-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ks-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ks-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ku-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ku-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kw-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kw-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ky-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ky-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lb-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lb-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lg-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lg-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-li-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-li-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lij-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lij-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ln-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ln-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lo-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lo-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lt-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lt-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lv-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lv-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lzh-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lzh-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mag-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mag-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mai-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mai-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mfe-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mfe-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mg-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mg-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mhr-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mhr-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mi-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mi-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-miq-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-miq-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mjw-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mjw-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mk-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mk-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ml-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ml-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mn-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mn-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mni-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mni-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mr-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mr-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ms-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ms-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mt-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mt-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-my-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-my-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nan-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nan-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nb-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nb-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nds-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nds-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ne-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ne-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nhn-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nhn-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-niu-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-niu-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nl-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nl-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nn-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nn-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nr-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nr-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nso-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nso-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-oc-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-oc-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-om-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-om-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-or-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-or-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-os-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-os-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pa-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pa-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pap-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pap-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pl-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pl-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ps-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ps-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pt-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pt-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-quz-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-quz-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-raj-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-raj-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ro-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ro-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ru-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ru-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-rw-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-rw-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sa-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sa-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sah-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sah-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sat-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sat-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sc-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sc-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sd-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sd-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-se-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-se-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sgs-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sgs-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-shn-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-shn-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-shs-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-shs-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-si-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-si-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sid-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sid-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sk-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sk-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sl-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sl-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sm-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sm-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-so-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-so-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sq-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sq-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sr-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sr-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ss-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ss-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-st-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-st-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sv-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sv-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sw-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sw-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-szl-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-szl-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ta-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ta-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tcy-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tcy-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-te-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-te-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tg-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tg-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-th-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-th-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-the-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-the-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ti-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ti-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tig-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tig-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tk-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tk-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tl-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tl-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tn-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tn-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-to-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-to-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tpi-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tpi-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tr-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tr-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ts-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ts-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tt-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tt-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ug-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ug-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-uk-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-uk-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-unm-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-unm-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ur-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ur-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-uz-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-uz-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ve-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ve-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-vi-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-vi-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-wa-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-wa-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-wae-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-wae-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-wal-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-wal-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-wo-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-wo-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-xh-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-xh-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-yi-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-yi-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-yo-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-yo-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-yue-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-yue-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-yuw-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-yuw-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-zh-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-zh-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-zu-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-zu-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-locale-source-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-locale-source-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-minimal-langpack-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-minimal-langpack-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-nss-devel-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-nss-devel-2.28-151.0.1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-nss-devel-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-static-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-static-2.28-151.0.1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-static-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-utils-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-utils-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libnsl-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libnsl-2.28-151.0.1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libnsl-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nscd-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nscd-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nss_db-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nss_db-2.28-151.0.1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nss_db-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nss_hesiod-2.28-151.0.1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nss_hesiod-2.28-151.0.1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nss_hesiod-2.28-151.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n rpm_prefix = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['rpm_prefix'])) rpm_prefix = package_array['rpm_prefix'];\n if (reference && release) {\n if (rpm_prefix) {\n if (rpm_exists(release:release, rpm:rpm_prefix) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'compat-libpthread-nonshared / glibc / glibc-all-langpacks / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:05", "description": "The remote Oracle Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2021-1586 advisory.\n\n - A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability. (CVE-2020-13543)\n\n - An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability. (CVE-2020-13584)\n\n - The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL).\n Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450. (CVE-2019-13012)\n\n - A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0.\n Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9948)\n\n - A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0.\n Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9951)\n\n - An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution. (CVE-2020-9983)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-26T00:00:00", "type": "nessus", "title": "Oracle Linux 8 : GNOME (ELSA-2021-1586)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-12450", "CVE-2019-13012", "CVE-2020-13543", "CVE-2020-13584", "CVE-2020-9948", "CVE-2020-9951", "CVE-2020-9983"], "modified": "2021-05-26T00:00:00", "cpe": ["cpe:/o:oracle:linux:8", "p-cpe:/a:oracle:linux:openexr-devel", "p-cpe:/a:oracle:linux:openexr-libs", "p-cpe:/a:oracle:linux:accountsservice", "p-cpe:/a:oracle:linux:accountsservice-devel", "p-cpe:/a:oracle:linux:accountsservice-libs", "p-cpe:/a:oracle:linux:atkmm", "p-cpe:/a:oracle:linux:atkmm-devel", "p-cpe:/a:oracle:linux:atkmm-doc", "p-cpe:/a:oracle:linux:cairomm", "p-cpe:/a:oracle:linux:cairomm-devel", "p-cpe:/a:oracle:linux:cairomm-doc", "p-cpe:/a:oracle:linux:chrome-gnome-shell", "p-cpe:/a:oracle:linux:dleyna-core", "p-cpe:/a:oracle:linux:dleyna-server", "p-cpe:/a:oracle:linux:enchant2", "p-cpe:/a:oracle:linux:enchant2-devel", "p-cpe:/a:oracle:linux:gamin", "p-cpe:/a:oracle:linux:gamin-devel", "p-cpe:/a:oracle:linux:gdm", "p-cpe:/a:oracle:linux:geoclue2", "p-cpe:/a:oracle:linux:geoclue2-demos", "p-cpe:/a:oracle:linux:geoclue2-devel", "p-cpe:/a:oracle:linux:geoclue2-libs", "p-cpe:/a:oracle:linux:geocode-glib", "p-cpe:/a:oracle:linux:geocode-glib-devel", "p-cpe:/a:oracle:linux:gjs", "p-cpe:/a:oracle:linux:gjs-devel", "p-cpe:/a:oracle:linux:glib2", "p-cpe:/a:oracle:linux:glib2-devel", "p-cpe:/a:oracle:linux:glib2-doc", "p-cpe:/a:oracle:linux:glib2-fam", "p-cpe:/a:oracle:linux:glib2-static", "p-cpe:/a:oracle:linux:glib2-tests", "p-cpe:/a:oracle:linux:glibmm24", "p-cpe:/a:oracle:linux:glibmm24-devel", "p-cpe:/a:oracle:linux:glibmm24-doc", "p-cpe:/a:oracle:linux:gnome-boxes", "p-cpe:/a:oracle:linux:gnome-classic-session", "p-cpe:/a:oracle:linux:gnome-control-center", "p-cpe:/a:oracle:linux:gnome-control-center-filesystem", "p-cpe:/a:oracle:linux:gnome-online-accounts", "p-cpe:/a:oracle:linux:gnome-online-accounts-devel", "p-cpe:/a:oracle:linux:gnome-photos", "p-cpe:/a:oracle:linux:gnome-photos-tests", "p-cpe:/a:oracle:linux:gnome-settings-daemon", "p-cpe:/a:oracle:linux:gnome-shell", "p-cpe:/a:oracle:linux:gnome-shell-extension-apps-menu", "p-cpe:/a:oracle:linux:gnome-shell-extension-auto-move-windows", "p-cpe:/a:oracle:linux:gnome-shell-extension-common", "p-cpe:/a:oracle:linux:gnome-shell-extension-dash-to-dock", "p-cpe:/a:oracle:linux:gnome-shell-extension-desktop-icons", "p-cpe:/a:oracle:linux:gnome-shell-extension-disable-screenshield", "p-cpe:/a:oracle:linux:gnome-shell-extension-drive-menu", "p-cpe:/a:oracle:linux:gnome-shell-extension-horizontal-workspaces", "p-cpe:/a:oracle:linux:gnome-shell-extension-launch-new-instance", "p-cpe:/a:oracle:linux:gnome-shell-extension-native-window-placement", "p-cpe:/a:oracle:linux:gnome-shell-extension-no-hot-corner", "p-cpe:/a:oracle:linux:gnome-shell-extension-panel-favorites", "p-cpe:/a:oracle:linux:gnome-shell-extension-places-menu", "p-cpe:/a:oracle:linux:gnome-shell-extension-screenshot-window-sizer", "p-cpe:/a:oracle:linux:gnome-shell-extension-systemmonitor", "p-cpe:/a:oracle:linux:gnome-shell-extension-top-icons", "p-cpe:/a:oracle:linux:gnome-shell-extension-updates-dialog", "p-cpe:/a:oracle:linux:gnome-shell-extension-user-theme", "p-cpe:/a:oracle:linux:gnome-shell-extension-window-grouper", "p-cpe:/a:oracle:linux:gnome-shell-extension-window-list", "p-cpe:/a:oracle:linux:gnome-shell-extension-windowsnavigator", "p-cpe:/a:oracle:linux:gnome-shell-extension-workspace-indicator", "p-cpe:/a:oracle:linux:gnome-software", "p-cpe:/a:oracle:linux:gnome-terminal", "p-cpe:/a:oracle:linux:gnome-terminal-nautilus", "p-cpe:/a:oracle:linux:gtk-doc", "p-cpe:/a:oracle:linux:gtk2", "p-cpe:/a:oracle:linux:gtk2-devel", "p-cpe:/a:oracle:linux:gtk2-devel-docs", "p-cpe:/a:oracle:linux:gtk2-immodule-xim", "p-cpe:/a:oracle:linux:gtk2-immodules", "p-cpe:/a:oracle:linux:gtkmm24", "p-cpe:/a:oracle:linux:gtkmm24-devel", "p-cpe:/a:oracle:linux:gtkmm24-docs", "p-cpe:/a:oracle:linux:gtkmm30", "p-cpe:/a:oracle:linux:gtkmm30-devel", "p-cpe:/a:oracle:linux:gtkmm30-doc", "p-cpe:/a:oracle:linux:gvfs", "p-cpe:/a:oracle:linux:gvfs-afc", "p-cpe:/a:oracle:linux:gvfs-afp", "p-cpe:/a:oracle:linux:gvfs-archive", "p-cpe:/a:oracle:linux:gvfs-client", "p-cpe:/a:oracle:linux:gvfs-devel", "p-cpe:/a:oracle:linux:gvfs-fuse", "p-cpe:/a:oracle:linux:gvfs-goa", "p-cpe:/a:oracle:linux:gvfs-gphoto2", "p-cpe:/a:oracle:linux:gvfs-mtp", "p-cpe:/a:oracle:linux:gvfs-smb", "p-cpe:/a:oracle:linux:libdazzle", "p-cpe:/a:oracle:linux:libdazzle-devel", "p-cpe:/a:oracle:linux:libepubgen", "p-cpe:/a:oracle:linux:libepubgen-devel", "p-cpe:/a:oracle:linux:libsass", "p-cpe:/a:oracle:linux:libsass-devel", "p-cpe:/a:oracle:linux:libsigc%2b%2b20", "p-cpe:/a:oracle:linux:libsigc%2b%2b20-devel", "p-cpe:/a:oracle:linux:libsigc%2b%2b20-doc", "p-cpe:/a:oracle:linux:libvisual", "p-cpe:/a:oracle:linux:libvisual-devel", "p-cpe:/a:oracle:linux:mutter", "p-cpe:/a:oracle:linux:mutter-devel", "p-cpe:/a:oracle:linux:nautilus", "p-cpe:/a:oracle:linux:nautilus-devel", "p-cpe:/a:oracle:linux:nautilus-extensions", "p-cpe:/a:oracle:linux:pangomm", "p-cpe:/a:oracle:linux:pangomm-devel", "p-cpe:/a:oracle:linux:pangomm-doc", "p-cpe:/a:oracle:linux:soundtouch", "p-cpe:/a:oracle:linux:soundtouch-devel", "p-cpe:/a:oracle:linux:vala", "p-cpe:/a:oracle:linux:vala-devel", "p-cpe:/a:oracle:linux:webkit2gtk3", "p-cpe:/a:oracle:linux:webkit2gtk3-devel", "p-cpe:/a:oracle:linux:webkit2gtk3-jsc", "p-cpe:/a:oracle:linux:webkit2gtk3-jsc-devel", "p-cpe:/a:oracle:linux:woff2", "p-cpe:/a:oracle:linux:woff2-devel"], "id": "ORACLELINUX_ELSA-2021-1586.NASL", "href": "https://www.tenable.com/plugins/nessus/149947", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2021-1586.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149947);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/05/26\");\n\n script_cve_id(\n \"CVE-2019-13012\",\n \"CVE-2020-9948\",\n \"CVE-2020-9951\",\n \"CVE-2020-9983\",\n \"CVE-2020-13543\",\n \"CVE-2020-13584\"\n );\n\n script_name(english:\"Oracle Linux 8 : GNOME (ELSA-2021-1586)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nELSA-2021-1586 advisory.\n\n - A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A\n specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code\n execution. An attacker can get a user to visit a webpage to trigger this vulnerability. (CVE-2020-13543)\n\n - An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially\n crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The\n victim needs to visit a malicious web site to trigger this vulnerability. (CVE-2020-13584)\n\n - The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using\n g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents\n (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL).\n Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories,\n 0777 permissions are used; for files, default file permissions are used. This is similar to\n CVE-2019-12450. (CVE-2019-13012)\n\n - A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0.\n Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9948)\n\n - A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0.\n Processing maliciously crafted web content may lead to arbitrary code execution. (CVE-2020-9951)\n\n - An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari\n 14.0. Processing maliciously crafted web content may lead to code execution. (CVE-2020-9983)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2021-1586.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-9983\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/26\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:OpenEXR-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:OpenEXR-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:accountsservice\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:accountsservice-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:accountsservice-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:atkmm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:atkmm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:atkmm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:cairomm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:cairomm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:cairomm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:chrome-gnome-shell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dleyna-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dleyna-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:enchant2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:enchant2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gamin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gamin-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gdm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:geoclue2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:geoclue2-demos\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:geoclue2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:geoclue2-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:geocode-glib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:geocode-glib-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gjs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gjs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glib2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glib2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glib2-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glib2-fam\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glib2-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glib2-tests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibmm24\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibmm24-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibmm24-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-boxes\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-classic-session\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-control-center\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-control-center-filesystem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-online-accounts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-online-accounts-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-photos\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-photos-tests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-settings-daemon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-apps-menu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-auto-move-windows\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-dash-to-dock\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-desktop-icons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-disable-screenshield\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-drive-menu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-horizontal-workspaces\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-launch-new-instance\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-native-window-placement\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-no-hot-corner\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-panel-favorites\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-places-menu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-screenshot-window-sizer\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-systemMonitor\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-top-icons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-updates-dialog\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-user-theme\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-window-grouper\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-window-list\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-windowsNavigator\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-shell-extension-workspace-indicator\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-software\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-terminal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gnome-terminal-nautilus\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtk-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtk2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtk2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtk2-devel-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtk2-immodule-xim\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtk2-immodules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtkmm24\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtkmm24-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtkmm24-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtkmm30\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtkmm30-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gtkmm30-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-afc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-afp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-archive\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-fuse\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-goa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-gphoto2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-mtp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gvfs-smb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libdazzle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libdazzle-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libepubgen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libepubgen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libsass\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libsass-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libsigc++20\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libsigc++20-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libsigc++20-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvisual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvisual-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mutter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:mutter-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:nautilus\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:nautilus-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:nautilus-extensions\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:pangomm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:pangomm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:pangomm-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:soundtouch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:soundtouch-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:vala\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:vala-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:webkit2gtk3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:webkit2gtk3-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:webkit2gtk3-jsc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:webkit2gtk3-jsc-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:woff2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:woff2-devel\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 8', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\n\npkgs = [\n {'reference':'accountsservice-0.6.55-1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'accountsservice-0.6.55-1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'accountsservice-devel-0.6.55-1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'accountsservice-devel-0.6.55-1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'accountsservice-devel-0.6.55-1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'accountsservice-libs-0.6.55-1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'accountsservice-libs-0.6.55-1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'accountsservice-libs-0.6.55-1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'atkmm-2.24.2-7.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'atkmm-2.24.2-7.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'atkmm-2.24.2-7.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'atkmm-devel-2.24.2-7.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'atkmm-devel-2.24.2-7.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'atkmm-devel-2.24.2-7.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'atkmm-doc-2.24.2-7.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'cairomm-1.12.0-8.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'cairomm-1.12.0-8.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'cairomm-1.12.0-8.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'cairomm-devel-1.12.0-8.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'cairomm-devel-1.12.0-8.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'cairomm-devel-1.12.0-8.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'cairomm-doc-1.12.0-8.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'chrome-gnome-shell-10.1-7.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'chrome-gnome-shell-10.1-7.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dleyna-core-0.6.0-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dleyna-core-0.6.0-3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dleyna-core-0.6.0-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'dleyna-server-0.6.0-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'enchant2-2.2.3-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'enchant2-2.2.3-3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'enchant2-2.2.3-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'enchant2-devel-2.2.3-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'enchant2-devel-2.2.3-3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'enchant2-devel-2.2.3-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gamin-0.1.10-32.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gamin-0.1.10-32.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gamin-0.1.10-32.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gamin-devel-0.1.10-32.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gamin-devel-0.1.10-32.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gamin-devel-0.1.10-32.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gdm-3.28.3-39.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'1'},\n {'reference':'gdm-3.28.3-39.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'1'},\n {'reference':'gdm-3.28.3-39.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'1'},\n {'reference':'geoclue2-2.5.5-2.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geoclue2-2.5.5-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geoclue2-2.5.5-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geoclue2-demos-2.5.5-2.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geoclue2-demos-2.5.5-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geoclue2-devel-2.5.5-2.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geoclue2-devel-2.5.5-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geoclue2-devel-2.5.5-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geoclue2-libs-2.5.5-2.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geoclue2-libs-2.5.5-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geoclue2-libs-2.5.5-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geocode-glib-3.26.0-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geocode-glib-3.26.0-3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geocode-glib-3.26.0-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geocode-glib-devel-3.26.0-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geocode-glib-devel-3.26.0-3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'geocode-glib-devel-3.26.0-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gjs-1.56.2-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gjs-1.56.2-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gjs-1.56.2-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gjs-devel-1.56.2-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gjs-devel-1.56.2-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gjs-devel-1.56.2-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-2.56.4-9.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-2.56.4-9.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-2.56.4-9.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-devel-2.56.4-9.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-devel-2.56.4-9.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-devel-2.56.4-9.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-doc-2.56.4-9.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-fam-2.56.4-9.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-fam-2.56.4-9.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-static-2.56.4-9.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-static-2.56.4-9.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-static-2.56.4-9.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-tests-2.56.4-9.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glib2-tests-2.56.4-9.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibmm24-2.56.0-2.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibmm24-2.56.0-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibmm24-2.56.0-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibmm24-devel-2.56.0-2.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibmm24-devel-2.56.0-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibmm24-devel-2.56.0-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibmm24-doc-2.56.0-2.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-boxes-3.36.5-8.0.1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-classic-session-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-control-center-3.28.2-27.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-control-center-3.28.2-27.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-control-center-filesystem-3.28.2-27.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-online-accounts-3.28.2-2.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-online-accounts-3.28.2-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-online-accounts-3.28.2-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-online-accounts-devel-3.28.2-2.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-online-accounts-devel-3.28.2-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-online-accounts-devel-3.28.2-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-photos-3.28.1-4.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-photos-tests-3.28.1-4.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-settings-daemon-3.32.0-14.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-settings-daemon-3.32.0-14.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-3.32.2-30.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-3.32.2-30.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-apps-menu-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-auto-move-windows-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-common-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-dash-to-dock-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-desktop-icons-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-disable-screenshield-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-drive-menu-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-horizontal-workspaces-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-launch-new-instance-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-native-window-placement-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-no-hot-corner-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-panel-favorites-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-places-menu-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-screenshot-window-sizer-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-systemMonitor-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-top-icons-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-updates-dialog-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-user-theme-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-window-grouper-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-window-list-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-windowsNavigator-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-shell-extension-workspace-indicator-3.32.1-14.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-software-3.36.1-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-software-3.36.1-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-terminal-3.28.3-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-terminal-3.28.3-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-terminal-nautilus-3.28.3-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gnome-terminal-nautilus-3.28.3-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk-doc-1.28-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk-doc-1.28-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-2.24.32-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-2.24.32-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-2.24.32-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-devel-2.24.32-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-devel-2.24.32-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-devel-2.24.32-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-devel-docs-2.24.32-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-devel-docs-2.24.32-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-immodule-xim-2.24.32-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-immodule-xim-2.24.32-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-immodule-xim-2.24.32-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-immodules-2.24.32-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-immodules-2.24.32-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtk2-immodules-2.24.32-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm24-2.24.5-6.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm24-2.24.5-6.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm24-2.24.5-6.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm24-devel-2.24.5-6.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm24-devel-2.24.5-6.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm24-devel-2.24.5-6.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm24-docs-2.24.5-6.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm30-3.22.2-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm30-3.22.2-3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm30-3.22.2-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm30-devel-3.22.2-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm30-devel-3.22.2-3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm30-devel-3.22.2-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gtkmm30-doc-3.22.2-3.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-1.36.2-11.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-1.36.2-11.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-1.36.2-11.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-afc-1.36.2-11.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-afc-1.36.2-11.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-afp-1.36.2-11.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-afp-1.36.2-11.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-archive-1.36.2-11.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-archive-1.36.2-11.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-client-1.36.2-11.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-client-1.36.2-11.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-client-1.36.2-11.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-devel-1.36.2-11.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-devel-1.36.2-11.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-devel-1.36.2-11.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-fuse-1.36.2-11.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-fuse-1.36.2-11.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-goa-1.36.2-11.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-goa-1.36.2-11.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-gphoto2-1.36.2-11.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-gphoto2-1.36.2-11.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-mtp-1.36.2-11.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-mtp-1.36.2-11.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-smb-1.36.2-11.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gvfs-smb-1.36.2-11.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libdazzle-3.28.5-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libdazzle-3.28.5-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libdazzle-devel-3.28.5-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libdazzle-devel-3.28.5-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libepubgen-0.1.0-3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libepubgen-0.1.0-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libepubgen-devel-0.1.0-3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libepubgen-devel-0.1.0-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsass-3.4.5-6.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsass-3.4.5-6.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsass-3.4.5-6.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsass-devel-3.4.5-6.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsass-devel-3.4.5-6.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsass-devel-3.4.5-6.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsigc++20-2.10.0-6.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsigc++20-2.10.0-6.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsigc++20-2.10.0-6.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsigc++20-devel-2.10.0-6.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsigc++20-devel-2.10.0-6.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsigc++20-devel-2.10.0-6.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libsigc++20-doc-2.10.0-6.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libvisual-0.4.0-25.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'1'},\n {'reference':'libvisual-0.4.0-25.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'1'},\n {'reference':'libvisual-0.4.0-25.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'1'},\n {'reference':'libvisual-devel-0.4.0-25.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'1'},\n {'reference':'libvisual-devel-0.4.0-25.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'1'},\n {'reference':'libvisual-devel-0.4.0-25.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'1'},\n {'reference':'mutter-3.32.2-57.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'mutter-3.32.2-57.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'mutter-3.32.2-57.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'mutter-devel-3.32.2-57.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'mutter-devel-3.32.2-57.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'mutter-devel-3.32.2-57.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nautilus-3.28.1-15.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nautilus-3.28.1-15.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nautilus-3.28.1-15.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nautilus-devel-3.28.1-15.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nautilus-devel-3.28.1-15.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nautilus-devel-3.28.1-15.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nautilus-extensions-3.28.1-15.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nautilus-extensions-3.28.1-15.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'nautilus-extensions-3.28.1-15.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'OpenEXR-devel-2.2.0-12.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'OpenEXR-devel-2.2.0-12.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'OpenEXR-devel-2.2.0-12.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'OpenEXR-libs-2.2.0-12.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'OpenEXR-libs-2.2.0-12.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'OpenEXR-libs-2.2.0-12.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'pangomm-2.40.1-6.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'pangomm-2.40.1-6.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'pangomm-2.40.1-6.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'pangomm-devel-2.40.1-6.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'pangomm-devel-2.40.1-6.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'pangomm-devel-2.40.1-6.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'pangomm-doc-2.40.1-6.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'soundtouch-2.0.0-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'soundtouch-2.0.0-3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'soundtouch-2.0.0-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'soundtouch-devel-2.0.0-3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'soundtouch-devel-2.0.0-3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'soundtouch-devel-2.0.0-3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'vala-0.40.19-2.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'vala-0.40.19-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'vala-0.40.19-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'vala-devel-0.40.19-2.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'vala-devel-0.40.19-2.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'vala-devel-0.40.19-2.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-2.30.4-1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-2.30.4-1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-2.30.4-1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-devel-2.30.4-1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-devel-2.30.4-1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-devel-2.30.4-1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-jsc-2.30.4-1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-jsc-2.30.4-1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-jsc-2.30.4-1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-jsc-devel-2.30.4-1.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-jsc-devel-2.30.4-1.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'webkit2gtk3-jsc-devel-2.30.4-1.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'woff2-1.0.2-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'woff2-1.0.2-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'woff2-1.0.2-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'woff2-devel-1.0.2-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'woff2-devel-1.0.2-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'woff2-devel-1.0.2-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n rpm_prefix = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['rpm_prefix'])) rpm_prefix = package_array['rpm_prefix'];\n if (reference && release) {\n if (rpm_prefix) {\n if (rpm_exists(release:release, rpm:rpm_prefix) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'OpenEXR-devel / OpenEXR-libs / accountsservice / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:35:53", "description": "The remote Oracle Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2021-9344 advisory.\n\n - The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service. (CVE-2016-10228)\n\n - In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap- based buffer over-read via an attempted case-insensitive regular-expression match. (CVE-2019-9169)\n\n - The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228. (CVE-2020-27618)\n\n - The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. (CVE-2021-3326)\n\n - The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi- byte input sequences in the EUC-KR encoding, may have a buffer over-read. (CVE-2019-25013)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-11-05T00:00:00", "type": "nessus", "title": "Oracle Linux 8 : glibc (ELSA-2021-9344)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-10228", "CVE-2019-25013", "CVE-2019-9169", "CVE-2020-27618", "CVE-2021-3326"], "modified": "2022-01-21T00:00:00", "cpe": ["cpe:/o:oracle:linux:8", "p-cpe:/a:oracle:linux:compat-libpthread-nonshared", "p-cpe:/a:oracle:linux:glibc", "p-cpe:/a:oracle:linux:glibc-all-langpacks", "p-cpe:/a:oracle:linux:glibc-benchtests", "p-cpe:/a:oracle:linux:glibc-common", "p-cpe:/a:oracle:linux:glibc-devel", "p-cpe:/a:oracle:linux:glibc-headers", "p-cpe:/a:oracle:linux:glibc-langpack-aa", "p-cpe:/a:oracle:linux:glibc-langpack-af", "p-cpe:/a:oracle:linux:glibc-langpack-agr", "p-cpe:/a:oracle:linux:glibc-langpack-ak", "p-cpe:/a:oracle:linux:glibc-langpack-am", "p-cpe:/a:oracle:linux:glibc-langpack-an", "p-cpe:/a:oracle:linux:glibc-langpack-anp", "p-cpe:/a:oracle:linux:glibc-langpack-ar", "p-cpe:/a:oracle:linux:glibc-langpack-as", "p-cpe:/a:oracle:linux:glibc-langpack-ast", "p-cpe:/a:oracle:linux:glibc-langpack-ayc", "p-cpe:/a:oracle:linux:glibc-langpack-az", "p-cpe:/a:oracle:linux:glibc-langpack-be", "p-cpe:/a:oracle:linux:glibc-langpack-bem", "p-cpe:/a:oracle:linux:glibc-langpack-ber", "p-cpe:/a:oracle:linux:glibc-langpack-bg", "p-cpe:/a:oracle:linux:glibc-langpack-bhb", "p-cpe:/a:oracle:linux:glibc-langpack-bho", "p-cpe:/a:oracle:linux:glibc-langpack-bi", "p-cpe:/a:oracle:linux:glibc-langpack-bn", "p-cpe:/a:oracle:linux:glibc-langpack-bo", "p-cpe:/a:oracle:linux:glibc-langpack-br", "p-cpe:/a:oracle:linux:glibc-langpack-brx", "p-cpe:/a:oracle:linux:glibc-langpack-bs", "p-cpe:/a:oracle:linux:glibc-langpack-byn", "p-cpe:/a:oracle:linux:glibc-langpack-ca", "p-cpe:/a:oracle:linux:glibc-langpack-ce", "p-cpe:/a:oracle:linux:glibc-langpack-chr", "p-cpe:/a:oracle:linux:glibc-langpack-cmn", "p-cpe:/a:oracle:linux:glibc-langpack-crh", "p-cpe:/a:oracle:linux:glibc-langpack-cs", "p-cpe:/a:oracle:linux:glibc-langpack-csb", "p-cpe:/a:oracle:linux:glibc-langpack-cv", "p-cpe:/a:oracle:linux:glibc-langpack-cy", "p-cpe:/a:oracle:linux:glibc-langpack-da", "p-cpe:/a:oracle:linux:glibc-langpack-de", "p-cpe:/a:oracle:linux:glibc-langpack-doi", "p-cpe:/a:oracle:linux:glibc-langpack-dsb", "p-cpe:/a:oracle:linux:glibc-langpack-dv", "p-cpe:/a:oracle:linux:glibc-langpack-dz", "p-cpe:/a:oracle:linux:glibc-langpack-el", "p-cpe:/a:oracle:linux:glibc-langpack-en", "p-cpe:/a:oracle:linux:glibc-langpack-eo", "p-cpe:/a:oracle:linux:glibc-langpack-es", "p-cpe:/a:oracle:linux:glibc-langpack-et", "p-cpe:/a:oracle:linux:glibc-langpack-eu", "p-cpe:/a:oracle:linux:glibc-langpack-fa", "p-cpe:/a:oracle:linux:glibc-langpack-ff", "p-cpe:/a:oracle:linux:glibc-langpack-fi", "p-cpe:/a:oracle:linux:glibc-langpack-fil", "p-cpe:/a:oracle:linux:glibc-langpack-fo", "p-cpe:/a:oracle:linux:glibc-langpack-fr", "p-cpe:/a:oracle:linux:glibc-langpack-fur", "p-cpe:/a:oracle:linux:glibc-langpack-fy", "p-cpe:/a:oracle:linux:glibc-langpack-om", "p-cpe:/a:oracle:linux:glibc-langpack-ga", "p-cpe:/a:oracle:linux:glibc-langpack-or", "p-cpe:/a:oracle:linux:glibc-langpack-gd", "p-cpe:/a:oracle:linux:glibc-langpack-os", "p-cpe:/a:oracle:linux:glibc-langpack-gez", "p-cpe:/a:oracle:linux:glibc-langpack-pa", "p-cpe:/a:oracle:linux:glibc-langpack-gl", "p-cpe:/a:oracle:linux:glibc-langpack-pap", "p-cpe:/a:oracle:linux:glibc-langpack-pl", "p-cpe:/a:oracle:linux:glibc-langpack-ps", "p-cpe:/a:oracle:linux:glibc-langpack-pt", "p-cpe:/a:oracle:linux:glibc-langpack-gu", "p-cpe:/a:oracle:linux:glibc-langpack-quz", "p-cpe:/a:oracle:linux:glibc-langpack-gv", "p-cpe:/a:oracle:linux:glibc-langpack-raj", "p-cpe:/a:oracle:linux:glibc-langpack-ha", "p-cpe:/a:oracle:linux:glibc-langpack-ro", "p-cpe:/a:oracle:linux:glibc-langpack-hak", "p-cpe:/a:oracle:linux:glibc-langpack-ru", "p-cpe:/a:oracle:linux:glibc-langpack-he", "p-cpe:/a:oracle:linux:glibc-langpack-rw", "p-cpe:/a:oracle:linux:glibc-langpack-hi", "p-cpe:/a:oracle:linux:glibc-langpack-sa", "p-cpe:/a:oracle:linux:glibc-langpack-sah", "p-cpe:/a:oracle:linux:glibc-langpack-hif", "p-cpe:/a:oracle:linux:glibc-langpack-sat", "p-cpe:/a:oracle:linux:glibc-langpack-hne", "p-cpe:/a:oracle:linux:glibc-langpack-hr", "p-cpe:/a:oracle:linux:glibc-langpack-sc", "p-cpe:/a:oracle:linux:glibc-langpack-sd", "p-cpe:/a:oracle:linux:glibc-langpack-hsb", "p-cpe:/a:oracle:linux:glibc-langpack-se", "p-cpe:/a:oracle:linux:glibc-langpack-sgs", "p-cpe:/a:oracle:linux:glibc-langpack-ht", "p-cpe:/a:oracle:linux:glibc-langpack-shn", "p-cpe:/a:oracle:linux:glibc-langpack-shs", "p-cpe:/a:oracle:linux:glibc-langpack-si", "p-cpe:/a:oracle:linux:glibc-langpack-hu", "p-cpe:/a:oracle:linux:glibc-langpack-sid", "p-cpe:/a:oracle:linux:glibc-langpack-sk", "p-cpe:/a:oracle:linux:glibc-langpack-hy", "p-cpe:/a:oracle:linux:glibc-langpack-sl", "p-cpe:/a:oracle:linux:glibc-langpack-ia", "p-cpe:/a:oracle:linux:glibc-langpack-sm", "p-cpe:/a:oracle:linux:glibc-langpack-so", "p-cpe:/a:oracle:linux:glibc-langpack-id", "p-cpe:/a:oracle:linux:glibc-langpack-sq", "p-cpe:/a:oracle:linux:glibc-langpack-ig", "p-cpe:/a:oracle:linux:glibc-langpack-sr", "p-cpe:/a:oracle:linux:glibc-langpack-ik", "p-cpe:/a:oracle:linux:glibc-langpack-ss", "p-cpe:/a:oracle:linux:glibc-langpack-st", "p-cpe:/a:oracle:linux:glibc-langpack-is", "p-cpe:/a:oracle:linux:glibc-langpack-sv", "p-cpe:/a:oracle:linux:glibc-langpack-it", "p-cpe:/a:oracle:linux:glibc-langpack-sw", "p-cpe:/a:oracle:linux:glibc-langpack-szl", "p-cpe:/a:oracle:linux:glibc-langpack-iu", "p-cpe:/a:oracle:linux:glibc-langpack-ta", "p-cpe:/a:oracle:linux:glibc-langpack-ja", "p-cpe:/a:oracle:linux:glibc-langpack-tcy", "p-cpe:/a:oracle:linux:glibc-langpack-ka", "p-cpe:/a:oracle:linux:glibc-langpack-te", "p-cpe:/a:oracle:linux:glibc-langpack-tg", "p-cpe:/a:oracle:linux:glibc-langpack-th", "p-cpe:/a:oracle:linux:glibc-langpack-kab", "p-cpe:/a:oracle:linux:glibc-langpack-the", "p-cpe:/a:oracle:linux:glibc-langpack-kk", "p-cpe:/a:oracle:linux:glibc-langpack-ti", "p-cpe:/a:oracle:linux:glibc-langpack-kl", "p-cpe:/a:oracle:linux:glibc-langpack-tig", "p-cpe:/a:oracle:linux:glibc-langpack-tk", "p-cpe:/a:oracle:linux:glibc-langpack-km", "p-cpe:/a:oracle:linux:glibc-langpack-tl", "p-cpe:/a:oracle:linux:glibc-langpack-kn", "p-cpe:/a:oracle:linux:glibc-langpack-tn", "p-cpe:/a:oracle:linux:glibc-langpack-ko", "p-cpe:/a:oracle:linux:glibc-langpack-to", "p-cpe:/a:oracle:linux:glibc-langpack-kok", "p-cpe:/a:oracle:linux:glibc-langpack-tpi", "p-cpe:/a:oracle:linux:glibc-langpack-ks", "p-cpe:/a:oracle:linux:glibc-langpack-tr", "p-cpe:/a:oracle:linux:glibc-langpack-ts", "p-cpe:/a:oracle:linux:glibc-langpack-ku", "p-cpe:/a:oracle:linux:glibc-langpack-tt", "p-cpe:/a:oracle:linux:glibc-langpack-kw", "p-cpe:/a:oracle:linux:glibc-langpack-ug", "p-cpe:/a:oracle:linux:glibc-langpack-ky", "p-cpe:/a:oracle:linux:glibc-langpack-uk", "p-cpe:/a:oracle:linux:glibc-langpack-unm", "p-cpe:/a:oracle:linux:glibc-langpack-ur", "p-cpe:/a:oracle:linux:glibc-langpack-uz", "p-cpe:/a:oracle:linux:glibc-langpack-lb", "p-cpe:/a:oracle:linux:glibc-langpack-ve", "p-cpe:/a:oracle:linux:glibc-langpack-lg", "p-cpe:/a:oracle:linux:glibc-langpack-vi", "p-cpe:/a:oracle:linux:glibc-langpack-li", "p-cpe:/a:oracle:linux:glibc-langpack-wa", "p-cpe:/a:oracle:linux:glibc-langpack-lij", "p-cpe:/a:oracle:linux:glibc-langpack-wae", "p-cpe:/a:oracle:linux:glibc-langpack-ln", "p-cpe:/a:oracle:linux:glibc-langpack-wal", "p-cpe:/a:oracle:linux:glibc-langpack-lo", "p-cpe:/a:oracle:linux:glibc-langpack-wo", "p-cpe:/a:oracle:linux:glibc-langpack-xh", "p-cpe:/a:oracle:linux:glibc-langpack-lt", "p-cpe:/a:oracle:linux:glibc-langpack-yi", "p-cpe:/a:oracle:linux:glibc-langpack-lv", "p-cpe:/a:oracle:linux:glibc-langpack-yo", "p-cpe:/a:oracle:linux:glibc-langpack-yue", "p-cpe:/a:oracle:linux:glibc-langpack-lzh", "p-cpe:/a:oracle:linux:glibc-langpack-yuw", "p-cpe:/a:oracle:linux:glibc-langpack-mag", "p-cpe:/a:oracle:linux:glibc-langpack-zh", "p-cpe:/a:oracle:linux:glibc-langpack-mai", "p-cpe:/a:oracle:linux:glibc-langpack-zu", "p-cpe:/a:oracle:linux:glibc-locale-source", "p-cpe:/a:oracle:linux:glibc-minimal-langpack", "p-cpe:/a:oracle:linux:glibc-langpack-mfe", "p-cpe:/a:oracle:linux:glibc-nss-devel", "p-cpe:/a:oracle:linux:glibc-langpack-mg", "p-cpe:/a:oracle:linux:glibc-static", "p-cpe:/a:oracle:linux:glibc-langpack-mhr", "p-cpe:/a:oracle:linux:glibc-utils", "p-cpe:/a:oracle:linux:glibc-langpack-mi", "p-cpe:/a:oracle:linux:libnsl", "p-cpe:/a:oracle:linux:glibc-langpack-miq", "p-cpe:/a:oracle:linux:nscd", "p-cpe:/a:oracle:linux:glibc-langpack-mjw", "p-cpe:/a:oracle:linux:nss_db", "p-cpe:/a:oracle:linux:nss_hesiod", "p-cpe:/a:oracle:linux:glibc-langpack-mk", "p-cpe:/a:oracle:linux:glibc-langpack-ml", "p-cpe:/a:oracle:linux:glibc-langpack-mn", "p-cpe:/a:oracle:linux:glibc-langpack-mni", "p-cpe:/a:oracle:linux:glibc-langpack-mr", "p-cpe:/a:oracle:linux:glibc-langpack-ms", "p-cpe:/a:oracle:linux:glibc-langpack-mt", "p-cpe:/a:oracle:linux:glibc-langpack-my", "p-cpe:/a:oracle:linux:glibc-langpack-nan", "p-cpe:/a:oracle:linux:glibc-langpack-nb", "p-cpe:/a:oracle:linux:glibc-langpack-nds", "p-cpe:/a:oracle:linux:glibc-langpack-ne", "p-cpe:/a:oracle:linux:glibc-langpack-nhn", "p-cpe:/a:oracle:linux:glibc-langpack-niu", "p-cpe:/a:oracle:linux:glibc-langpack-nl", "p-cpe:/a:oracle:linux:glibc-langpack-nn", "p-cpe:/a:oracle:linux:glibc-langpack-nr", "p-cpe:/a:oracle:linux:glibc-langpack-nso", "p-cpe:/a:oracle:linux:glibc-langpack-oc"], "id": "ORACLELINUX_ELSA-2021-9344.NASL", "href": "https://www.tenable.com/plugins/nessus/154917", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2021-9344.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(154917);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/01/21\");\n\n script_cve_id(\n \"CVE-2016-10228\",\n \"CVE-2019-9169\",\n \"CVE-2019-25013\",\n \"CVE-2020-27618\",\n \"CVE-2021-3326\"\n );\n\n script_name(english:\"Oracle Linux 8 : glibc (ELSA-2021-9344)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nELSA-2021-9344 advisory.\n\n - The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple\n suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite\n loop when processing invalid multi-byte input sequences, leading to a denial of service. (CVE-2016-10228)\n\n - In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-\n based buffer over-read via an attempted case-insensitive regular-expression match. (CVE-2019-9169)\n\n - The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid\n multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance\n the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a\n different vulnerability from CVE-2016-10228. (CVE-2020-27618)\n\n - The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid\n input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program,\n potentially resulting in a denial of service. (CVE-2021-3326)\n\n - The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-\n byte input sequences in the EUC-KR encoding, may have a buffer over-read. (CVE-2019-25013)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2021-9344.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-9169\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/07/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/11/05\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:compat-libpthread-nonshared\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-all-langpacks\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-benchtests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-aa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-af\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-agr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ak\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-am\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-an\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-anp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-as\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ast\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ayc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-az\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-be\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ber\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bhb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bho\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-br\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-brx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-bs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-byn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ce\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-chr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-cmn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-crh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-csb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-cv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-cy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-da\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-doi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-dsb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-dv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-dz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-en\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-eo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-es\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-et\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-eu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fil\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fur\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-fy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ga\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-gez\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-gl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-gu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-gv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ha\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hak\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-he\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hif\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hne\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hsb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ht\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-hy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-id\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ig\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ik\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-is\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-iu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ka\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kab\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-km\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kok\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ks\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ku\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-kw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ky\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-li\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lij\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ln\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-lzh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mag\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mai\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mfe\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mhr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-miq\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mjw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mni\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-mt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-my\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nds\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ne\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nhn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-niu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-nso\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-oc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-om\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-or\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-os\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-pa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-pap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ps\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-pt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-quz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-raj\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ro\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-rw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sah\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-se\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sgs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-shn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-shs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-si\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sid\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-so\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sq\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-st\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-sw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-szl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ta\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tcy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-te\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-th\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-the\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ti\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tig\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-to\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tpi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-tt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-uk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-unm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ur\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-uz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-ve\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-vi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-wa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-wae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-wal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-wo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-xh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-yi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-yo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-yue\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-yuw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-zh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-langpack-zu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-locale-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-minimal-langpack\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:glibc-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libnsl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:nscd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:nss_db\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:nss_hesiod\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 8', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\n\nvar pkgs = [\n {'reference':'compat-libpthread-nonshared-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'compat-libpthread-nonshared-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-2.28-151.0.1.ksplice2.el8', 'cpu':'i686', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-all-langpacks-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-all-langpacks-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-benchtests-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-benchtests-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-common-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-common-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-devel-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-devel-2.28-151.0.1.ksplice2.el8', 'cpu':'i686', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-devel-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-headers-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-headers-2.28-151.0.1.ksplice2.el8', 'cpu':'i686', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-headers-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-aa-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-aa-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-af-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-af-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-agr-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-agr-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ak-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ak-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-am-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-am-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-an-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-an-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-anp-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-anp-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ar-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ar-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-as-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-as-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ast-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ast-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ayc-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ayc-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-az-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-az-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-be-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-be-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bem-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bem-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ber-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ber-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bg-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bg-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bhb-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bhb-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bho-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bho-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bi-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bi-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bn-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bn-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bo-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bo-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-br-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-br-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-brx-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-brx-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bs-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-bs-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-byn-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-byn-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ca-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ca-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ce-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ce-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-chr-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-chr-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-cmn-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-cmn-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-crh-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-crh-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-cs-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-cs-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-csb-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-csb-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-cv-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-cv-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-cy-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-cy-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-da-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-da-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-de-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-de-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-doi-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-doi-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-dsb-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-dsb-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-dv-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-dv-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-dz-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-dz-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-el-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-el-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-en-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-en-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-eo-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-eo-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-es-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-es-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-et-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-et-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-eu-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-eu-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fa-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fa-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ff-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ff-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fi-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fi-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fil-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fil-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fo-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fo-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fr-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fr-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fur-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fur-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fy-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-fy-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ga-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ga-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-gd-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-gd-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-gez-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-gez-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-gl-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-gl-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-gu-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-gu-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-gv-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-gv-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ha-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ha-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hak-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hak-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-he-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-he-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hi-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hi-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hif-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hif-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hne-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hne-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hr-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hr-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hsb-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hsb-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ht-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ht-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hu-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hu-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hy-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-hy-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ia-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ia-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-id-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-id-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ig-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ig-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ik-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ik-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-is-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-is-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-it-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-it-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-iu-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-iu-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ja-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ja-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ka-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ka-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kab-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kab-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kk-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kk-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kl-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kl-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-km-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-km-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kn-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kn-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ko-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ko-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kok-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kok-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ks-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ks-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ku-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ku-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kw-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-kw-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ky-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ky-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lb-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lb-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lg-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lg-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-li-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-li-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lij-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lij-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ln-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ln-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lo-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lo-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lt-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lt-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lv-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lv-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lzh-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-lzh-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mag-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mag-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mai-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mai-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mfe-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mfe-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mg-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mg-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mhr-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mhr-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mi-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mi-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-miq-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-miq-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mjw-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mjw-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mk-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mk-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ml-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ml-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mn-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mn-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mni-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mni-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mr-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mr-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ms-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ms-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mt-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-mt-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-my-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-my-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nan-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nan-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nb-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nb-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nds-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nds-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ne-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ne-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nhn-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nhn-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-niu-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-niu-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nl-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nl-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nn-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nn-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nr-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nr-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nso-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-nso-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-oc-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-oc-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-om-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-om-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-or-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-or-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-os-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-os-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-pa-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-pa-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-pap-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-pap-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-pl-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-pl-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ps-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ps-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-pt-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-pt-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-quz-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-quz-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-raj-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-raj-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ro-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ro-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ru-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ru-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-rw-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-rw-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sa-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sa-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sah-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sah-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sat-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sat-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sc-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sc-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sd-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sd-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-se-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-se-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sgs-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sgs-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-shn-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-shn-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-shs-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-shs-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-si-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-si-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sid-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sid-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sk-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sk-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sl-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sl-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sm-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sm-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-so-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-so-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sq-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sq-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sr-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sr-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ss-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ss-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-st-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-st-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sv-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sv-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sw-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-sw-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-szl-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-szl-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ta-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ta-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tcy-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tcy-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-te-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-te-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tg-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tg-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-th-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-th-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-the-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-the-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ti-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ti-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tig-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tig-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tk-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tk-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tl-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tl-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tn-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tn-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-to-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-to-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tpi-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tpi-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tr-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tr-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ts-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ts-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tt-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-tt-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ug-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ug-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-uk-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-uk-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-unm-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-unm-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ur-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ur-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-uz-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-uz-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ve-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-ve-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-vi-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-vi-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-wa-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-wa-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-wae-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-wae-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-wal-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-wal-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-wo-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-wo-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-xh-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-xh-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-yi-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-yi-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-yo-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-yo-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-yue-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-yue-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-yuw-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-yuw-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-zh-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-zh-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-zu-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-langpack-zu-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-locale-source-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-locale-source-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-minimal-langpack-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-minimal-langpack-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-nss-devel-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-nss-devel-2.28-151.0.1.ksplice2.el8', 'cpu':'i686', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-nss-devel-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-static-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-static-2.28-151.0.1.ksplice2.el8', 'cpu':'i686', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-static-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-utils-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'glibc-utils-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'libnsl-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'libnsl-2.28-151.0.1.ksplice2.el8', 'cpu':'i686', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'libnsl-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'nscd-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'nscd-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'nss_db-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'nss_db-2.28-151.0.1.ksplice2.el8', 'cpu':'i686', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'nss_db-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'nss_hesiod-2.28-151.0.1.ksplice2.el8', 'cpu':'aarch64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'nss_hesiod-2.28-151.0.1.ksplice2.el8', 'cpu':'i686', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'},\n {'reference':'nss_hesiod-2.28-151.0.1.ksplice2.el8', 'cpu':'x86_64', 'release':'8', 'el_string':'ksplice2.el8', 'rpm_spec_vers_cmp':TRUE, 'epoch':'2'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'compat-libpthread-nonshared / glibc / glibc-all-langpacks / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:50", "description": "The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the CESA-2021:1585 advisory.\n\n - glibc: iconv program can hang when invoked with the -c option (CVE-2016-10228)\n\n - glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013)\n\n - glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over- read (CVE-2019-9169)\n\n - glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which could result in an infinite loop (CVE-2020-27618)\n\n - glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters (CVE-2021-3326)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-28T00:00:00", "type": "nessus", "title": "CentOS 8 : glibc (CESA-2021:1585)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-10228", "CVE-2019-25013", "CVE-2019-9169", "CVE-2020-27618", "CVE-2021-3326"], "modified": "2021-05-28T00:00:00", "cpe": ["cpe:/o:centos:centos:8", "cpe:/o:centos:centos:8-stream", "p-cpe:/a:centos:centos:glibc-utils", "p-cpe:/a:centos:centos:compat-libpthread-nonshared", "p-cpe:/a:centos:centos:libnsl", "p-cpe:/a:centos:centos:glibc", "p-cpe:/a:centos:centos:nscd", "p-cpe:/a:centos:centos:glibc-all-langpacks", "p-cpe:/a:centos:centos:nss_db", "p-cpe:/a:centos:centos:glibc-benchtests", "p-cpe:/a:centos:centos:glibc-common", "p-cpe:/a:centos:centos:glibc-devel", "p-cpe:/a:centos:centos:nss_hesiod", "p-cpe:/a:centos:centos:glibc-headers", "p-cpe:/a:centos:centos:glibc-langpack-aa", "p-cpe:/a:centos:centos:glibc-langpack-af", "p-cpe:/a:centos:centos:glibc-langpack-agr", "p-cpe:/a:centos:centos:glibc-langpack-ak", "p-cpe:/a:centos:centos:glibc-langpack-am", "p-cpe:/a:centos:centos:glibc-langpack-an", "p-cpe:/a:centos:centos:glibc-langpack-anp", "p-cpe:/a:centos:centos:glibc-langpack-ar", "p-cpe:/a:centos:centos:glibc-langpack-as", "p-cpe:/a:centos:centos:glibc-langpack-ast", "p-cpe:/a:centos:centos:glibc-langpack-ayc", "p-cpe:/a:centos:centos:glibc-langpack-az", "p-cpe:/a:centos:centos:glibc-langpack-be", "p-cpe:/a:centos:centos:glibc-langpack-bem", "p-cpe:/a:centos:centos:glibc-langpack-ber", "p-cpe:/a:centos:centos:glibc-langpack-bg", "p-cpe:/a:centos:centos:glibc-langpack-bhb", "p-cpe:/a:centos:centos:glibc-langpack-bho", "p-cpe:/a:centos:centos:glibc-langpack-bi", "p-cpe:/a:centos:centos:glibc-langpack-bn", "p-cpe:/a:centos:centos:glibc-langpack-bo", "p-cpe:/a:centos:centos:glibc-langpack-br", "p-cpe:/a:centos:centos:glibc-langpack-brx", "p-cpe:/a:centos:centos:glibc-langpack-bs", "p-cpe:/a:centos:centos:glibc-langpack-byn", "p-cpe:/a:centos:centos:glibc-langpack-ca", "p-cpe:/a:centos:centos:glibc-langpack-ce", "p-cpe:/a:centos:centos:glibc-langpack-chr", "p-cpe:/a:centos:centos:glibc-langpack-cmn", "p-cpe:/a:centos:centos:glibc-langpack-crh", "p-cpe:/a:centos:centos:glibc-langpack-cs", "p-cpe:/a:centos:centos:glibc-langpack-csb", "p-cpe:/a:centos:centos:glibc-langpack-cv", "p-cpe:/a:centos:centos:glibc-langpack-cy", "p-cpe:/a:centos:centos:glibc-langpack-da", "p-cpe:/a:centos:centos:glibc-langpack-de", "p-cpe:/a:centos:centos:glibc-langpack-doi", "p-cpe:/a:centos:centos:glibc-langpack-dsb", "p-cpe:/a:centos:centos:glibc-langpack-dv", "p-cpe:/a:centos:centos:glibc-langpack-dz", "p-cpe:/a:centos:centos:glibc-langpack-el", "p-cpe:/a:centos:centos:glibc-langpack-en", "p-cpe:/a:centos:centos:glibc-langpack-eo", "p-cpe:/a:centos:centos:glibc-langpack-es", "p-cpe:/a:centos:centos:glibc-langpack-et", "p-cpe:/a:centos:centos:glibc-langpack-eu", "p-cpe:/a:centos:centos:glibc-langpack-fa", "p-cpe:/a:centos:centos:glibc-langpack-ff", "p-cpe:/a:centos:centos:glibc-langpack-fi", "p-cpe:/a:centos:centos:glibc-langpack-fil", "p-cpe:/a:centos:centos:glibc-langpack-fo", "p-cpe:/a:centos:centos:glibc-langpack-fr", "p-cpe:/a:centos:centos:glibc-langpack-fur", "p-cpe:/a:centos:centos:glibc-langpack-fy", "p-cpe:/a:centos:centos:glibc-langpack-ga", "p-cpe:/a:centos:centos:glibc-langpack-gd", "p-cpe:/a:centos:centos:glibc-langpack-gez", "p-cpe:/a:centos:centos:glibc-langpack-gl", "p-cpe:/a:centos:centos:glibc-langpack-gu", "p-cpe:/a:centos:centos:glibc-langpack-gv", "p-cpe:/a:centos:centos:glibc-langpack-ha", "p-cpe:/a:centos:centos:glibc-langpack-hak", "p-cpe:/a:centos:centos:glibc-langpack-he", "p-cpe:/a:centos:centos:glibc-langpack-hi", "p-cpe:/a:centos:centos:glibc-langpack-hif", "p-cpe:/a:centos:centos:glibc-langpack-hne", "p-cpe:/a:centos:centos:glibc-langpack-hr", "p-cpe:/a:centos:centos:glibc-langpack-hsb", "p-cpe:/a:centos:centos:glibc-langpack-ht", "p-cpe:/a:centos:centos:glibc-langpack-hu", "p-cpe:/a:centos:centos:glibc-langpack-hy", "p-cpe:/a:centos:centos:glibc-langpack-ia", "p-cpe:/a:centos:centos:glibc-langpack-id", "p-cpe:/a:centos:centos:glibc-langpack-ig", "p-cpe:/a:centos:centos:glibc-langpack-ik", "p-cpe:/a:centos:centos:glibc-langpack-is", "p-cpe:/a:centos:centos:glibc-langpack-it", "p-cpe:/a:centos:centos:glibc-langpack-iu", "p-cpe:/a:centos:centos:glibc-langpack-ja", "p-cpe:/a:centos:centos:glibc-langpack-ka", "p-cpe:/a:centos:centos:glibc-langpack-kab", "p-cpe:/a:centos:centos:glibc-langpack-kk", "p-cpe:/a:centos:centos:glibc-langpack-kl", "p-cpe:/a:centos:centos:glibc-langpack-km", "p-cpe:/a:centos:centos:glibc-langpack-kn", "p-cpe:/a:centos:centos:glibc-langpack-ko", "p-cpe:/a:centos:centos:glibc-langpack-kok", "p-cpe:/a:centos:centos:glibc-langpack-ks", "p-cpe:/a:centos:centos:glibc-langpack-ku", "p-cpe:/a:centos:centos:glibc-langpack-kw", "p-cpe:/a:centos:centos:glibc-langpack-ky", "p-cpe:/a:centos:centos:glibc-langpack-lb", "p-cpe:/a:centos:centos:glibc-langpack-lg", "p-cpe:/a:centos:centos:glibc-langpack-li", "p-cpe:/a:centos:centos:glibc-langpack-lij", "p-cpe:/a:centos:centos:glibc-langpack-ln", "p-cpe:/a:centos:centos:glibc-langpack-lo", "p-cpe:/a:centos:centos:glibc-langpack-lt", "p-cpe:/a:centos:centos:glibc-langpack-lv", "p-cpe:/a:centos:centos:glibc-langpack-lzh", "p-cpe:/a:centos:centos:glibc-langpack-mag", "p-cpe:/a:centos:centos:glibc-langpack-mai", "p-cpe:/a:centos:centos:glibc-langpack-mfe", "p-cpe:/a:centos:centos:glibc-langpack-mg", "p-cpe:/a:centos:centos:glibc-langpack-mhr", "p-cpe:/a:centos:centos:glibc-langpack-mi", "p-cpe:/a:centos:centos:glibc-langpack-miq", "p-cpe:/a:centos:centos:glibc-langpack-mjw", "p-cpe:/a:centos:centos:glibc-langpack-mk", "p-cpe:/a:centos:centos:glibc-langpack-ml", "p-cpe:/a:centos:centos:glibc-langpack-mn", "p-cpe:/a:centos:centos:glibc-langpack-mni", "p-cpe:/a:centos:centos:glibc-langpack-mr", "p-cpe:/a:centos:centos:glibc-langpack-ms", "p-cpe:/a:centos:centos:glibc-langpack-mt", "p-cpe:/a:centos:centos:glibc-langpack-my", "p-cpe:/a:centos:centos:glibc-langpack-nan", "p-cpe:/a:centos:centos:glibc-langpack-nb", "p-cpe:/a:centos:centos:glibc-langpack-nds", "p-cpe:/a:centos:centos:glibc-langpack-ne", "p-cpe:/a:centos:centos:glibc-langpack-nhn", "p-cpe:/a:centos:centos:glibc-langpack-niu", "p-cpe:/a:centos:centos:glibc-langpack-nl", "p-cpe:/a:centos:centos:glibc-langpack-nn", "p-cpe:/a:centos:centos:glibc-langpack-nr", "p-cpe:/a:centos:centos:glibc-langpack-nso", "p-cpe:/a:centos:centos:glibc-langpack-oc", "p-cpe:/a:centos:centos:glibc-langpack-om", "p-cpe:/a:centos:centos:glibc-langpack-or", "p-cpe:/a:centos:centos:glibc-langpack-os", "p-cpe:/a:centos:centos:glibc-langpack-pa", "p-cpe:/a:centos:centos:glibc-langpack-pap", "p-cpe:/a:centos:centos:glibc-langpack-pl", "p-cpe:/a:centos:centos:glibc-langpack-ps", "p-cpe:/a:centos:centos:glibc-langpack-pt", "p-cpe:/a:centos:centos:glibc-langpack-quz", "p-cpe:/a:centos:centos:glibc-langpack-raj", "p-cpe:/a:centos:centos:glibc-langpack-ro", "p-cpe:/a:centos:centos:glibc-langpack-ru", "p-cpe:/a:centos:centos:glibc-langpack-rw", "p-cpe:/a:centos:centos:glibc-langpack-sa", "p-cpe:/a:centos:centos:glibc-langpack-sah", "p-cpe:/a:centos:centos:glibc-langpack-sat", "p-cpe:/a:centos:centos:glibc-langpack-sc", "p-cpe:/a:centos:centos:glibc-langpack-sd", "p-cpe:/a:centos:centos:glibc-langpack-se", "p-cpe:/a:centos:centos:glibc-langpack-sgs", "p-cpe:/a:centos:centos:glibc-langpack-shn", "p-cpe:/a:centos:centos:glibc-langpack-shs", "p-cpe:/a:centos:centos:glibc-langpack-si", "p-cpe:/a:centos:centos:glibc-langpack-sid", "p-cpe:/a:centos:centos:glibc-langpack-sk", "p-cpe:/a:centos:centos:glibc-langpack-sl", "p-cpe:/a:centos:centos:glibc-langpack-sm", "p-cpe:/a:centos:centos:glibc-langpack-so", "p-cpe:/a:centos:centos:glibc-langpack-sq", "p-cpe:/a:centos:centos:glibc-langpack-sr", "p-cpe:/a:centos:centos:glibc-langpack-ss", "p-cpe:/a:centos:centos:glibc-langpack-st", "p-cpe:/a:centos:centos:glibc-langpack-sv", "p-cpe:/a:centos:centos:glibc-langpack-sw", "p-cpe:/a:centos:centos:glibc-langpack-szl", "p-cpe:/a:centos:centos:glibc-langpack-ta", "p-cpe:/a:centos:centos:glibc-langpack-tcy", "p-cpe:/a:centos:centos:glibc-langpack-te", "p-cpe:/a:centos:centos:glibc-langpack-tg", "p-cpe:/a:centos:centos:glibc-langpack-th", "p-cpe:/a:centos:centos:glibc-langpack-the", "p-cpe:/a:centos:centos:glibc-langpack-ti", "p-cpe:/a:centos:centos:glibc-langpack-tig", "p-cpe:/a:centos:centos:glibc-langpack-tk", "p-cpe:/a:centos:centos:glibc-langpack-tl", "p-cpe:/a:centos:centos:glibc-langpack-tn", "p-cpe:/a:centos:centos:glibc-langpack-to", "p-cpe:/a:centos:centos:glibc-langpack-tpi", "p-cpe:/a:centos:centos:glibc-langpack-tr", "p-cpe:/a:centos:centos:glibc-langpack-ts", "p-cpe:/a:centos:centos:glibc-langpack-tt", "p-cpe:/a:centos:centos:glibc-langpack-ug", "p-cpe:/a:centos:centos:glibc-langpack-uk", "p-cpe:/a:centos:centos:glibc-langpack-unm", "p-cpe:/a:centos:centos:glibc-langpack-ur", "p-cpe:/a:centos:centos:glibc-langpack-uz", "p-cpe:/a:centos:centos:glibc-langpack-ve", "p-cpe:/a:centos:centos:glibc-langpack-vi", "p-cpe:/a:centos:centos:glibc-langpack-wa", "p-cpe:/a:centos:centos:glibc-langpack-wae", "p-cpe:/a:centos:centos:glibc-langpack-wal", "p-cpe:/a:centos:centos:glibc-langpack-wo", "p-cpe:/a:centos:centos:glibc-langpack-xh", "p-cpe:/a:centos:centos:glibc-langpack-yi", "p-cpe:/a:centos:centos:glibc-langpack-yo", "p-cpe:/a:centos:centos:glibc-langpack-yue", "p-cpe:/a:centos:centos:glibc-langpack-yuw", "p-cpe:/a:centos:centos:glibc-langpack-zh", "p-cpe:/a:centos:centos:glibc-langpack-zu", "p-cpe:/a:centos:centos:glibc-locale-source", "p-cpe:/a:centos:centos:glibc-minimal-langpack", "p-cpe:/a:centos:centos:glibc-nss-devel", "p-cpe:/a:centos:centos:glibc-static"], "id": "CENTOS8_RHSA-2021-1585.NASL", "href": "https://www.tenable.com/plugins/nessus/150034", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from\n# Red Hat Security Advisory RHSA-2021:1585. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(150034);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/05/28\");\n\n script_cve_id(\n \"CVE-2016-10228\",\n \"CVE-2019-9169\",\n \"CVE-2019-25013\",\n \"CVE-2020-27618\",\n \"CVE-2021-3326\"\n );\n script_xref(name:\"RHSA\", value:\"2021:1585\");\n\n script_name(english:\"CentOS 8 : glibc (CESA-2021:1585)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote CentOS host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote CentOS Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nCESA-2021:1585 advisory.\n\n - glibc: iconv program can hang when invoked with the -c option (CVE-2016-10228)\n\n - glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding\n (CVE-2019-25013)\n\n - glibc: regular-expression match via proceed_next_node in posix/regexec.c leads to heap-based buffer over-\n read (CVE-2019-9169)\n\n - glibc: iconv when processing invalid multi-byte input sequences fails to advance the input state, which\n could result in an infinite loop (CVE-2020-27618)\n\n - glibc: Assertion failure in ISO-2022-JP-3 gconv module related to combining characters (CVE-2021-3326)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2021:1585\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-9169\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/28\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:centos:centos:8-stream\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:compat-libpthread-nonshared\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-all-langpacks\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-benchtests\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-aa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-af\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-agr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ak\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-am\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-an\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-anp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ar\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-as\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ast\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ayc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-az\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-be\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-bem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ber\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-bg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-bhb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-bho\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-bi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-bn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-bo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-br\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-brx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-bs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-byn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ca\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ce\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-chr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-cmn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-crh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-cs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-csb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-cv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-cy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-da\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-de\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-doi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-dsb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-dv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-dz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-el\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-en\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-eo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-es\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-et\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-eu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-fa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ff\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-fi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-fil\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-fo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-fr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-fur\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-fy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ga\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-gd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-gez\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-gl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-gu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-gv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ha\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-hak\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-he\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-hi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-hif\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-hne\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-hr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-hsb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ht\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-hu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-hy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ia\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-id\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ig\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ik\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-is\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-it\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-iu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ja\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ka\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-kab\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-kk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-kl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-km\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-kn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ko\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-kok\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ks\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ku\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-kw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ky\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-lb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-lg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-li\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-lij\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ln\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-lo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-lt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-lv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-lzh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mag\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mai\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mfe\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mhr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-miq\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mjw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ml\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mni\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-mt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-my\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-nan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-nb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-nds\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ne\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-nhn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-niu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-nl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-nn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-nr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-nso\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-oc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-om\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-or\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-os\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-pa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-pap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-pl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ps\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-pt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-quz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-raj\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ro\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ru\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-rw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sah\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-se\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sgs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-shn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-shs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-si\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sid\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-so\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sq\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ss\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-st\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-sw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-szl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ta\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-tcy\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-te\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-tg\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-th\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-the\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ti\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-tig\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-tk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-tl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-tn\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-to\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-tpi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-tr\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-tt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-uk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-unm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ur\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-uz\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-ve\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-vi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-wa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-wae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-wal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-wo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-xh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-yi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-yo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-yue\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-yuw\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-zh\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-langpack-zu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-locale-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-minimal-langpack\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-nss-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:glibc-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:libnsl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:nscd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:nss_db\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:centos:centos:nss_hesiod\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"CentOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/CentOS/release\", \"Host/CentOS/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/CentOS/release');\nif (isnull(release) || 'CentOS' >!< release) audit(AUDIT_OS_NOT, 'CentOS');\nos_ver = pregmatch(pattern: \"CentOS(?: Stream)?(?: Linux)? release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'CentOS');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'CentOS 8.x', 'CentOS ' + os_ver);\n\nif (!get_kb_item('Host/CentOS/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'CentOS', cpu);\n\npkgs = [\n {'reference':'compat-libpthread-nonshared-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'compat-libpthread-nonshared-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-all-langpacks-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-all-langpacks-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-benchtests-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-benchtests-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-common-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-common-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-devel-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-devel-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-headers-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-headers-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-aa-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-aa-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-af-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-af-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-agr-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-agr-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ak-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ak-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-am-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-am-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-an-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-an-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-anp-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-anp-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ar-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ar-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-as-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-as-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ast-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ast-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ayc-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ayc-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-az-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-az-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-be-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-be-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bem-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bem-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ber-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ber-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bg-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bg-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bhb-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bhb-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bho-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bho-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bi-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bi-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bn-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bn-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bo-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bo-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-br-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-br-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-brx-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-brx-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bs-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-bs-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-byn-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-byn-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ca-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ca-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ce-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ce-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-chr-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-chr-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cmn-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cmn-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-crh-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-crh-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cs-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cs-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-csb-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-csb-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cv-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cv-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cy-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-cy-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-da-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-da-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-de-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-de-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-doi-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-doi-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dsb-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dsb-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dv-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dv-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dz-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-dz-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-el-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-el-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-en-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-en-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-eo-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-eo-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-es-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-es-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-et-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-et-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-eu-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-eu-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fa-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fa-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ff-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ff-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fi-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fi-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fil-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fil-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fo-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fo-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fr-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fr-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fur-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fur-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fy-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-fy-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ga-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ga-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gd-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gd-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gez-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gez-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gl-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gl-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gu-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gu-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gv-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-gv-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ha-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ha-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hak-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hak-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-he-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-he-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hi-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hi-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hif-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hif-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hne-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hne-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hr-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hr-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hsb-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hsb-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ht-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ht-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hu-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hu-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hy-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-hy-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ia-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ia-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-id-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-id-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ig-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ig-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ik-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ik-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-is-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-is-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-it-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-it-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-iu-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-iu-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ja-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ja-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ka-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ka-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kab-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kab-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kk-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kk-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kl-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kl-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-km-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-km-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kn-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kn-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ko-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ko-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kok-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kok-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ks-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ks-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ku-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ku-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kw-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-kw-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ky-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ky-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lb-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lb-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lg-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lg-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-li-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-li-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lij-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lij-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ln-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ln-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lo-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lo-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lt-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lt-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lv-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lv-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lzh-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-lzh-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mag-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mag-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mai-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mai-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mfe-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mfe-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mg-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mg-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mhr-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mhr-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mi-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mi-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-miq-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-miq-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mjw-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mjw-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mk-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mk-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ml-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ml-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mn-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mn-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mni-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mni-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mr-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mr-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ms-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ms-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mt-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-mt-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-my-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-my-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nan-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nan-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nb-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nb-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nds-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nds-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ne-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ne-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nhn-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nhn-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-niu-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-niu-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nl-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nl-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nn-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nn-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nr-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nr-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nso-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-nso-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-oc-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-oc-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-om-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-om-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-or-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-or-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-os-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-os-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pa-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pa-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pap-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pap-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pl-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pl-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ps-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ps-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pt-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-pt-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-quz-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-quz-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-raj-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-raj-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ro-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ro-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ru-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ru-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-rw-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-rw-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sa-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sa-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sah-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sah-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sat-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sat-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sc-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sc-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sd-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sd-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-se-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-se-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sgs-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sgs-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-shn-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-shn-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-shs-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-shs-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-si-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-si-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sid-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sid-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sk-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sk-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sl-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sl-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sm-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sm-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-so-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-so-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sq-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sq-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sr-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sr-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ss-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ss-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-st-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-st-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sv-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sv-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sw-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-sw-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-szl-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-szl-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ta-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-ta-2.28-151.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-langpack-tcy-2.28-151.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'glibc-lang